网络,协议开发的福音,wireshark官方推荐各种网络包处理工具合集

来源:互联网 发布:大数据安全监控 编辑:程序博客网 时间:2024/05/16 09:53

This is a place for scripts and tools related to Wireshark / TShark that users may like to share, and for links to relatedNetworkTroubleshooting tools.

You will find additional development related tools in the Development page.

Contents

  1. Tools
    1. Internal
    2. Scripts
    3. Wrappers
    4. External Links
      1. Dedicated capture tools
      2. Monitoring/tracing tools
      3. Traffic generators
      4. Capture file anonymization
      5. Capture file repair
      6. Capture file conversion
      7. Collections
      8. USB capture
      9. Intrusion Analysis / SQL Database Support

Internal

Some command line tools are shipped together with Wireshark. These tools are useful to work with capture files.

  • capinfos is a program that reads a saved capture file and returns any or all of several statistics about that file

  • dumpcap a small program which only purpose is to capture network traffic, while keeping advanced features like capturing to multiple files (since version 0.99.0)

  • editcap edit and/or translate the format of capture files

  • mergecap merges multiple capture files into one

  • randpkt random packet generator

  • rawshark dump and analyze raw libpcap data

  • reordercap reorder input file by timestamp into output file

  • text2pcap generates a capture file from an ASCII hexdump of packets

Scripts

  • menushark, a Bourne shell menu script to allow users to employ the use of tshark by answering a few menu questions. The script also gives you the command that the menu system has made to try to teach you how to use tshark at the command line.

  • mpeg_dump, a Lua script that adds a Wireshark extension to dump MPEG-2 transport stream packets (ISO/IEC 13818-1) from a network capture to a file, for example, to extract one or more mpeg PIDs that were transported via UDP unicast or multicast.

  • osXextraction, a Mac OS X bash script to extract particular packet types from a capture file (NOTE: it's not very OS X-specific - some small changes should allow it to work on other UN*Xes, and would probably allow it to work on Windows with Cygwin as well.)

  • RtpDumpScript, a perl script to dumpRTP audio data

  • RtpH263DumpScript, a perl script to dump H.263 video data

  • tektronix2pcap, a script to convert Tektronix rf5 files to pcap format that can be loaded into Wireshark. Note that current versions of Wireshark can directly readrf5 binary captures.

Wrappers

  • Net::Sharktools - Use Wireshark's packet dissection engine from Perl (blog entries:12).

  • Packet Dump Decode (pdd) is a simple and convenient GUI wrapper around the Wireshark tools to convert packet hexdumps into well formatted xml (viz. text2pcap and tshark). Using pdd, you just need to copy-paste the hexdump into pdd and hit the "Decode" button (GPL, Linux/Win32)

  • Packet Hexdump Decoder (phd) is a web-based utility that uses Wireshark tools to decode packet hexdumps online.

  • Sharktools - Use Wireshark's packet dissection engine from Matlab and Python (announcement).

Tools related to NetworkTroubleshooting and alike.

Dedicated capture tools

  • dumpcap shipped with Wireshark, already mentioned at the "Internal" section above

  • multicap (a packet capture tool for Linux)

  • netsniff-ng (a packet capture tool for Linux)

  • RawCap (a raw socket sniffer for Windows)

  • snoop SunOS/Solaris capture tool

  • SPAN Port Configurator (a Cisco SPAN port configuration tool for Windows)

  • TcpDump /WinDump the classical capture tool(s)

  • UML Sniffing a patch to enable sniffing inUser Mode Linux (like used innetkit)

Monitoring/tracing tools

The following tools can process the libpcap-format files that Wireshark and TShark produce or can perform network traffic capture and analysis functions complementary to those performed by Wireshark and TShark. In brackets you will find the program license and the supported operating systems.

  • Cap'r Mak'r generates new pcaps for various protocols

  • Chaosreader Extracts data streams from TCP connections and writes each stream to a file (GPL, Windows, various UN*Xes)

  • CloudShark Ability to view and analyze captures in a browser, annotate and tag them, and share them with a URL.

  • Cookie Cadger Helps identify information leakage from applications that utilize insecure HTTP GET requests.

  • Driftnet It is a program which listens to network traffic and picks out images from TCP streams it observes (GPL, Linux)

  • EtherApe A graphical network monitor (GPL, Linux only)

  • Ettercap Allows for sniffing of machines in a switched network LAN (GPL, BSD/Linux/Solaris)

  • ExtShark is web-interface to tshark. It will bring dumping to cloud.

  • HUNT Allows for sniffing of machines in a switched network LAN as well as providing a very easy to use API to modify the intercepted frames before they are forwarded. Intercept and Modify. (GPL, Linux)

  • Impacket It is a collection of Python classes focused on providing access to network packets (Apache, Linux).

  • ipsumdump summarizes TCP/IP dump files into a self-describing ASCII format easily readable by humans and programs (uses theClick modular router).

  • junkie A real-time packet sniffer and analyzer (AGPLv3, Linux)

  • justsniffer is a tcp packet sniffer. (GPL, BSD/Linux/Win32)

  • Moluch Moloch is an open source, large scale IPv4 packet capturing (PCAP), indexing and database system.

  • Mu DoS converts any packet into a DoS generator

  • NetSleuth is a free network forensics and pcap file analyser. It provides offline analysis for incident response, and live "silent portscanning" functionality. (GPL, Windows)

  • netsniff-ng is a free, Linux network analyzer and networking toolkit.

  • NetworkMiner A network forensic analysis tool (GPL, Windows)

  • Ntop Network top - tool that lets you analyze network traffic statistics (GPL, FreeBSD/Linux/Unix)

  • online message parser Online single hex message parser, supports Wireless/PSTN/VoIP protocols (Freeware, Web)

  • Online PCAP to MSC chart Generator generates MSC arrow diagram charts from PCAP files.

  • p0f versatile passive OS fingerprinting and many other tricks (Freeware, BSD/Linux/Win32/...). Take a lookhere to see some stats generated with p0f and some scripts.

  • packet-o-matic is a packet sniffer, supporting fairly general packet processing, used mainly for network forensics. (GPL, BSD/Linux/Mac OS X/Solaris)

  • PacketShark™ A handheld hardware tap for 100% on-field capturing of Ethernet packets at wire speed; store captured data using an external storage device (SD memory card) and analyze using wireshark

  • pcap_diff compares pcap files for received, missing or altered packets.

  • Prelude Another network intrusion detection system (GPL, BSD/Linux/Unix)

  • RRDtool is "a system to store and display time-series data (i.e. network bandwidth, machine-room temperature, server load average)". (GPL, various UN*Xes) Many RRDtool-based applications are listed on the RRD World page.

  • Show Traffic shows continuous summary list of TCP/UDP traffic (BSD, Win32)

  • Snort Network intrusion detection system (GPL, BSD/Linux/Unix/Win32)

  • SplitCap A pcap file splitter.

  • tcpflow Extracts data streams from TCP connections and writes each stream to a file (GPL, UN*X/Windows)

  • tcpick tcpick is a textmode sniffer libpcap-based that can track, reassemble and reorder tcp streams (GPL, BSD/Linux/Unix)

  • tcpstat Tool for reporting statistics for TCP connections (BSD style, BSD/Linux/Unix)

  • tcptrace Tool for analysis of TCP connections (GPL, BSD/Linux/Unix)

  • TcpView maps TCP/UDP endpoints to running programs (Freeware, Win32)

  • tcpxtract It is a tool for extracting files from network traffic based on file signatures (GPL, various UN*Xes)

  • Tele Traffic Tapper Graphical traffic-monitoring tool; can also read saved capture files (BSD style?, BSD/Linux)

  • TPCAT will analyze two packet captures (taken on each side of the firewall as an example) and report any packets that were seen on the source capture but didn’t make it to the destination (GPLv2, any OS with Python and pcapy)

  • Tranalyzer It is a lightweight flow generator and packet analyzer application (GPL, Linux)

  • Tstat A passive sniffer able to provide several insights on the traffic patterns at both the the network and transport levels (GPL, various UN*Xes)

  • VisualEther Protocol Analyzer generates sequence diagrams from Wireshark PDML output (Win32)

  • WebScarabWebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols.

  • Xplico A network forensic analysis tool (GPL, Linux only)

  • xtractr collaborative cloud app for indexing, searching, reporting and extracting on large pcaps using tshark

  • Expert Network Analysis An online tool where you can upload a pcap traffic trace captured in the network point considered as problematic and receive a personalized report

Traffic generators

These tools will either generate traffic and transmit it, retransmit traffic from a capture file, perhaps with changes, or permit you to edit traffic in a capture file and retransmit it.

  • Bit-Twist includes bittwist, to retransmit traffic from a capture file, and bittwiste, to edit a capture file and write the result to another file (GPL, BSD/Linux/OSX/Windows)

  • Cat Karat - Easy packet generation tool that allows to build custom packets for firewall or target testing and has integrated scripting ability for automated testing. (Windows)

  • D-ITG - (Distributed Internet Traffic Generator) is a platform capable to produce traffic at packet level accurately replicating appropriate stochastic processes for both IDT (Inter Departure Time) and PS (Packet Size) random variables (exponential, uniform, cauchy, normal, pareto, ...).

  • epb - ethernet package bombardier Simple CLI tool for generating/converting ethernet packets from plain text/pcap/netmon/snoop files. (BSD like, Linux/Unix)

  • Mausezahn Mausezahn is a free fast traffic generator written in C which allows you to send nearly every possible and impossible packet.

  • Nemesis is a command-line network packet crafting and injection utility. Nemesis can natively craft and inject ARP, DNS, ETHERNET, ICMP, IGMP, IP, OSPF, RIP, TCP and UDP packets. (GPL, BSD/Linux/Solaris/Mac OSX/Win32)

  • Network Expect is a framework that allows to easily build tools that can interact with network traffic. Following a script, traffic can be injected into the network, and decisions can be taken, and acted upon, based on received network traffic. An interpreted language provides branching and high-level control structures to direct the interaction with the network. Network Expect uses libwireshark for all packet dissection tasks. (GPL, BSD/Linux/OSX)

  • Network Traffic Generator Client/Server based TCP/UDP traffic generator (GPL, BSD/Linux/Win32)

  • Ostinato is a network packet and traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. It features custom packet crafting with editing of any field for several protocols: Ethernet, 802.3, LLC SNAP, VLAN (with Q-in-Q), ARP, IPv4, IPv6, IP-in-IP a.k.a IP Tunneling, TCP, UDP, ICMP, IGMP, MLD, HTTP, SIP, RTSP, NNTP, etc. It is useful for both functional and performance testing. (GPL, Linux/BSD/OSX/Win32)

  • packETH GUI/CLI Ethernet packet generator (GPL, Linux/OSX/Windows)

  • PlayCap is a GUI tool for playing back pcap/Wireshark captures (GPL, Linux/Windows).

  • Scapy Scapy is a powerful interactive packet manipulation program (in Python). It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. (GPL, BSD/Linux/OSX)

  • tcpreplay the opposite of tcpdump, send pcap files out of an interface (BSD, BSD/Linux/Unix)

This is another collection of traffic generators: http://www.grid.unina.it/software/ITG/link.php

Capture file anonymization

These tools can be used to "anonymize" capture files, replacing fields such as IP addresses with randomized values.

  • AnonTool from theCRAWDAD archive of wireless traffic.

  • The bittwiste tool from Bit-Twist.

  • The Crypto-PAn tool.

  • The Network Expect tool, which can be used to anonymize packets.

  • The pktanon tool from the Karlsruhe Institute of Technology Institute of Telematics.

  • The SCRUB-tcpdump tool.

  • The tcpdpriv tool from the Internet Traffic Archive.

  • The tcprewrite tool from tcpreplay.

  • The TraceWrangler tool.

There's a categorized list of anonymization tools at the CAIDA site.

Capture file repair

These tools attempt to repair damaged capture files as much as can be done.

  • pcapfix can repair corrupted or truncated capture files.

Capture file conversion

These tools convert between different capture file formats.

  • PcapNG.com Free online service that converts Pcap-NG files to plain libpcap (PCAP) format.

  • ProConvert convert capture files between different formats - some that Wireshark currently doesn't support (closed source freeware, unsupported and noted as buggy by vendor, registration and WildPackets maintenance contract required, Win32 only)

Collections

  • A list of tools Web page of links to various networking tools

  • dsniff is a collection of tools for network auditing and penetration testing (BSD style?, BSD/Linux/Solaris/...)

  • Network Security Toolkit (NST 20-5663) Fedora-based (F20) bootable Linux CD/DVD with best-of-breed open source network security tools. Provides a Web-Based frontend to the dumpcap network packet capture engine with dump file format:pcapng support. Simultaneous network packet capture on up to 4 network interfaces per Multi-Tap session is supported. Also provides IPv4 Address conversation geolocations and extensiveHTML report generation fromPDML andPSML packet decoding. See the article:Multi-Tap Network Packet Capturing for a tutorial and example usage. Capture starting can be delayed by a duration or an absolute date. Captures can be uploaded fromNST to"CloudShark.org" or a"CloudShark Appliance" for viewing, sharing and analysis in a web browser (See:HowTo Use The NST CloudShark Upload Manager for additional information).

  • Packetfactory projects Various networking-related tools and libraries

  • Top 75 Security Tools fromnmap users votes

USB capture

Raw USB traffic can be captured with Wireshark currently only under Linux, seeCaptureSetup/USB. If it's anEthernet (or any other network related) USB adapter, Wireshark can capture e.g. Ethernet traffic from that USB device if the platform supports it (which it usually will do). On Win32 you can however try:

  • SniffUSB "minor" updates and port of usbsnoop 1.8 (v2.0.0006 Feb 2007)

  • SnoopyPro based on usbsnoopy, last updated (v0.22) in 2002 (GPL, Win32)

    • Also usbsnoop seems to be by the same developer, but updated through 2001-2003 (latest v1.8)

  • usbsnoopy last updated (v0.13) in 2001 (no license, source incl., Win32)

Intrusion Analysis / SQL Database Support

  • C5 SIGMA fromCommand Five Pty Ltd automates TShark (Wireshark) to load large quantities of packet capture data into a SQL database using an automatically generated schema. C5 SIGMA flattens the Wireshark protocol tree into a relational table structure useful for intrusion analysis and data correlation with other systems. It also enables SQL queries against otherwise unnamed text fields visible in the Wireshark protocol tree by intelligently generating human readable names. C5 SIGMA is free software, released under GPL.

Tools (last edited 2014-02-21 01:02:55 byRonald W. Henderson)

 
 
 
 
 
 
 
 
原文地址:  http://wiki.wireshark.org/Tools
 
 
0 0