Wireshark is a popular open source graphical user interface (GUI) tool for analyzing packets. To understand these protocols, you need a tool that can capture and help you analyze these packets. Right now, while you are reading this article, numerous packets are being exchanged by your computer and traveling across the internet. Most of the time when we connect to the internet, we don't think about the network protocols at work underneath that make it all possible. We can also get a list of all the requested URLs (via the GET method): tshark -r http-traffic.pcap -T fields -e http.host -e -Y ' = "GET"' | sort | uniq | lessĭon’t forget to take a look at the official documentation. tshark -r tor.pcap -R "data-text-lines" -T fields -e text > alldata.txt Email addressĪnother interesting bit of data are email addresses, which we can extract by using a regexp on the raw data. You can find a list of useful display filters here. The option -R allows us to define display filters, in the same way we would in wireshark. User agents tshark -R 'http contains "User-Agent:"' -T fields -e er_agent -r tor2b.pcap | sort | uniq -c | sort -nr | less tshark -T fields -e http.host -r tor.pcap > dns.txtĬat dns.txt | sort | uniq -c | sort -nr | head To obtain this information we can use the http.host field and then a bit of sorting and this will show us the top 10 sites. Since we are dealing with mostly http traffic we may be interested in the sites that have been visited. One option could be wireshark and its command line version tshark. Using the latter we will be able to manipulate and format the output using tools like sed, grep, awk… Extracting host names with tshark Let’s say we have a packet capture file (.pcap) and we want to get as much information out of it as possible.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |