-
Notifications
You must be signed in to change notification settings - Fork 159
/
openVulnerabilityTrafficInWireshark.go
59 lines (48 loc) · 1.71 KB
/
openVulnerabilityTrafficInWireshark.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
/*
* NETCAP - Traffic Analysis Framework
* Copyright (c) 2017-2020 Philipp Mieden <dreadl0ck [at] protonmail [dot] ch>
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
package transform
import (
"fmt"
"log"
"os"
"os/exec"
"path/filepath"
"strings"
"github.com/dreadl0ck/maltego"
)
func openVulnerabilityTrafficInWireshark() {
var (
lt = maltego.ParseLocalArguments(os.Args)
trx = &maltego.Transform{}
in = strings.TrimSuffix(filepath.Dir(strings.TrimPrefix(lt.Values["path"], "file://")), ".net")
bpf, name = makeFlowsBPF(lt)
outFile, exists = makeOutFilePath(in, bpf, lt, true, name)
args = []string{"-r", in, "-w", outFile, bpf}
)
if !exists {
log.Println(tcpdump, args)
out, err := exec.Command(findExecutable(tcpdump, false), args...).CombinedOutput()
if err != nil {
maltego.Die(err.Error(), "open file failed:\n"+string(out))
}
log.Println(string(out))
}
log.Println(wireshark, outFile)
out, err := exec.Command(findExecutable(wireshark, false), outFile).CombinedOutput()
if err != nil {
maltego.Die(err.Error(), "open file failed:\n"+string(out))
}
log.Println(string(out))
trx.AddUIMessage("completed!", maltego.UIMessageInform)
fmt.Println(trx.ReturnOutput())
}