Skip to content

Packet_analysis

Heath Brown edited this page Nov 1, 2024 · 2 revisions

tshark

tshark -r input.pcapng -Tfields -e ip.src -e ip.dst -e tcp.analysis.flags | grep 1$
# source, destination, and then also having the analysis flags
172.27.81.41    1.1.1.1  1
172.27.81.41    1.1.1.1   1
172.27.81.41    1.1.1.1   1
172.27.81.41    1.1.1.1   1
172.27.81.41    1.1.1.1   1
172.27.81.41    1.1.1.1   1
172.27.81.41    1.1.1.1   1
172.27.81.41    1.1.1.1   1
172.27.81.41    1.1.1.1   1

using python for packet analysis

Using sharkd JSON-RPC

Exmaple code use using different python libraries

using golang for packet processing

Sample Captures

Example of using pyshark:

Video on pyshark

EXample of using Quokka

Clone this wiki locally