Pcaps analysis
最后更新于
这有帮助吗?
最后更新于
这有帮助吗?
Start searching for malware inside the pcap. Use the tools mentioned in .
A note about PCAP vs PCAPNG: there are two versions of the PCAP file format; PCAPNG is newer and not supported by all tools. You may need to convert a file from PCAPNG to PCAP using Wireshark or another compatible tool, in order to work with it in some other tools.
If the header of your pcap is broken you should try to fix it using: ****
Extract information and search for malware inside a pcap in ****
Inside wireshark you can see different statistics that could be useful. Some interesting http filters:
If you want to search for content inside the packets of the sessions press CTRL+f You can add new layers to the main information bar (No., Time, Source...) pressing right bottom and Edit Column
If you are looking for something inside the pcap you can use ngrep. And example using the main filters:
Xplico can analyze a pcap and extract information from it. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on.
Access to 127.0.0.1:9876 with credentials xplico:xplico
Then create a new case, create a new session inside the case and upload the pcap file.
Like Xplico it is a tool to analyze and extract objects from pcaps. It has a free edition that you can download .