Skip to content

maxng07/packetcap

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

29 Commits
 
 
 
 

Repository files navigation

packetcap

Lightweight Packet Capture with filtering option

PacketCap allows microsecond packets in Layer 2, 3 and 4 to be dumped to terminal, operates in promiscuous mode to capture packet length up to 1600 bytes. Supports filtering option to look at specific packets. The filtering syntax is implemented using Linux pcap-filter . PacketCap is lightweight and useful when wireshark or tcpdump is not available. Implemented using gopacket library that does the heavy lifting for BPF byte code filtering and pcap-filter string to BPF byte code. Supports writing of captured packet to pcap file format and sending captured packet to remote target using udp.

Release 2.11 adds

  • ability to display only tcp options (TCP MSS, NOP, Window Scale etc)
  • ability to capture up to specify packet count (works for tcp option display, packet capture and saving to pcap file).
Usage: pcap [options...] [device]
Options: 
  -d list all available network devices on machine
  -f pcap filter string to be used
  -w write packet filter to filename specified
  -r send filtered packet to remote target ipaddr:port using udp tunnel
  -c set the max number of packets capture
  -tcpoption display tcp options only
  -h help menu
  
  device - the local device or interface to enable packet capture

Example

To filter ICMP traffic

sudo ./pcapfilter -f "icmp" en0

To filter DNS traffic (udp53 and tcp53)

sudo ./pcapfilter -f "ip and udp port 53 or tcp port 53" en0

To filter telnet traffic

sudo ./pcapfilter -f "ip and port telnet" en0

To filter all traffic

sudo ./pcapfilter en0

To save output to local pcap file

sudo ./pcapfilter -f "ip and udp port 53" -w test.pcap en0

To list all known devices/interfaces on local machine

sudo ./pcapfilter -d

To send captured packet to remote target machine

sudo ./pcapfilter -f "ip and udp port 53" -r 127.0.0.1:5555 en0
See Wiki for more details

To capture only up to specify packet count

sudo pcapfilter -f "tcp port 80" -c 2
sudo pcapfilter -f "udp port 53" -c 3 -w dns.pcap

To capture only TCP Options

sudo pcapfilter -f "tcp port 80" -tcpoption -c 2
sudo pcapfilter -f "udp port 53" -tcpoption

How to Install

  1. Download the binaries from Release Page.
  2. For Windows
  • You will need winpcap, you can download it from here
  • To determine the device in Windows System, you can run pcapfilter -d which lists all the devices on the machine. Then use the GUID listed and appending with \\device\\NPF_{GUID} as the device.

pcapfilter -f "ip" \\device\\NPF_{GUID}

Changes:

Added Version 2 - allows the abillity to write packet capture output to local file.
Added Version 2.1 - added support for sending captured packet to remote udp target and enhance the display for available local devices/interfaces

Planned Enhancement

DTLS and/or gRPC target for encrypted tunnel

Licensing

packetcap uses google/gopacket libary

Copyright (c) 2012 Google, Inc. All rights reserved.
Copyright (c) 2009-2011 Andreas Krennmair. All rights reserved.

About

Lightweight Packet Capture with packet filtering, writing to pcap file and sending captured traffic to remote target.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published