Skip to content
A convertor from .pcap network capture files to HTTP Archive files.
Python Shell
Find file
Pull request Compare This branch is 10 commits ahead, 4 commits behind master.
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Failed to load latest commit information.
pcap2har
tests
.gitignore
LICENSE
README
dns_requests.pcap
main.py

README

pcap2har: converts .pcap network capture files to HTTP Archive files.

mailing list: http://groups.google.com/group/pcap2har

The HAR format is still not completely supported, but the main parts are there
and features are being added.

To run the program, run main.py with two arguments: the name of the capture
file, and the HAR output filename. For example:

./main.py my.pcap my_pcap.har

The HTTP Archive (HAR) file format specification is here:
http://groups.google.com/group/http-archive-specification/web/har-1-1-spec?hl=en
It is a fairly straightforward JSON format.

(WIP) To decrypt SSL3/TLS connections, you will need to supply a key log file
generated by a recent version of libnss, the SSL library used by Chrome and
Firefox. For more details, read https://developer.mozilla.org/en-US/docs/NSS_Key_Log_Format .
As of 17 Aug 2012, only unstable builds of Chrome support this. Once you have
a keylog, pass it to pcap2har with the --keylog flag, and pcap2har will do
its best to decrypt any SSL or TLS flows in the pcap.

pcap2har includes BeautifulSoup.py, by Leonard Richardson. It only uses the
class UnicodeDammit, for unicode encoding detection. Its capabilities will be
improved if the chardet library is also available. It can be gotten from here:
http://chardet.feedparser.org/

pcap2har is written in Python, and depends on the dpkt packet-parsing library
(http://code.google.com/p/dpkt/).
Something went wrong with that request. Please try again.