Skip to content

strixeyecom/gniffer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

48 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Contributors Forks Stargazers Issues MIT License LinkedIn


gniffer

Simple, lightweight, and easy to use gopacket wrapper cli
Explore the docs »

View Demo · Report Bug · Request Feature

Table of Contents
  1. About The Project
  2. Getting Started
  3. Usage
  4. Roadmap
  5. Contributing
  6. License
  7. Contact

About The Project

This project was initially created to help to mirror requests for StrixEye Agent.

Features

  • Redirect incoming requests to a target web server
  • Capture real time HTTP traffic from interfaces
  • Capture HTTP traffic from a pcap file

Built With

Thanks to maintainers and communities of the following projects for making development of this CLI easier. Full list of dependencies can be found in go modules file.

Getting Started

General information about setting up gniffer locally

Requirements

Required software and installations.

  • libpcap v1.10.0 or higher
  • flex
  • bison
  • gcc

Install flex and bison via your package manager.Then, to install libpcap, run the following script, preferably as root:

wget -O libpcap-1.10.0.tar.gz http://www.tcpdump.org/release/libpcap-1.10.0.tar.gz
tar -xf libpcap-1.10.0.tar.gz
cd libpcap-1.10.0
./configure
make && make install
ldconfig

Installation

Tarball

  1. Download latest-release for your operating system/architecture
  2. Unzip binary and place it somewhere in your path
  3. Make it executable

Build

Other than Go version 1.16.+, StrixEye CLI has no dependencies/requirements.

Basic building process like the following would suffice.

   go build -o gniffer main.go
Docker
    docker pull gniffer:latest

Usage

Shell

Following command will start sniffing loopback interface and redirect all incoming requests to target web server on target.omer.beer

gniffer sniff proxy --target-protocol=https --target-host=target.omer.beer --target-port=443 -i lo

Docker

The docker image comes as a command line utility, meaning you can access all cli commands.

docker run gniffer --help

Following command will start sniffing loopback interface and redirect all incoming requests to target web server on target.omer.beer

docker run gniffer sniff proxy --target-protocol=https --target-host=akaunting.agent.strixeye.com --target-port=443 -i lo

For more examples, please refer to the Documentation

Roadmap

See the open issues for a list of proposed features (and known issues).

Contributing

Contributions are what make the open source community such an amazing place to be learned, inspire, and create. Any contributions you make are greatly appreciated.

  1. Fork the Project
  2. Create your Feature Branch (git checkout -b feature/AmazingFeature)
  3. Commit your Changes (git commit -m 'Add some AmazingFeature')
  4. Push to the Branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request

License

Distributed under the Apache License 2.0 License. See LICENSE for more information.

Contact

StrixEye - @strixeye - help@strixeye.com

Project Link: https://github.com/strixeyecom/gniffer