|maride 1217153e78||6 months ago|
|analyze||6 months ago|
|common||7 months ago|
|output||6 months ago|
|protocol||6 months ago|
|.drone.yml||7 months ago|
|.gitignore||7 months ago|
|CONTRIBUTORS.md||7 months ago|
|LICENSE||7 months ago|
|README.md||7 months ago|
|analyzer_test.go||7 months ago|
|file.go||7 months ago|
|go.mod||7 months ago|
|go.sum||7 months ago|
|main.go||6 months ago|
If you get access to a PCAP file, for example during a CTF or captured on your own, you usually have the problem of overlooking all the relevant information to get a basic idea of the capture file. This gets worse if the capture file includes lots of white noise or irrelevant traffic - often included in the capture file to cloak interesting packets in a bunch of packets to YouTube, Reddit, Twitter and others.
pancap addresses this problem. With multiple submodules, it analyzes the given PCAP file and extracts useful information out of it. In many cases, this saves you a lot of time and can point you into the right direction.
go get git.darknebu.la/maride/pancap
This will also build
pancap and place it into your
GOBIN directory - means you can directly execute it!
In any use case, you need to specify the file you want to analyze, simply handed over to pancap with the
pancap -file ~/Schreibtisch/mitschnitt.pcapng
This will give you a result similar to this:
nGB big pcap takes
... yes please! There are still a lot of modules missing.
If you are brave enough, you can even implement another Link Type. Pancap currently only supports
Ethernet (which, to be honest, fits most cases well), but
USB might be interesting, too. Especially sniffed keyboard and mouse packets are hard to analyze by hand...