Skip to content

Program for static analysis of pcap files and recreation of information sent

License

Notifications You must be signed in to change notification settings

abaker2010/bustaPcap

Repository files navigation

bustaPcap

Generic badge Generic badge Generic badge Generic badge MIT license

Creators

Elliot Kjerstad and Aaron Baker

Overview

This is a small program that was built for network traffic captures (PCAPS) 
during the REU internship at DSU. The program analyzes traffic to help 
determine protocol usage, ssl/tls versions used, IP to IP communication, 
IP to FQDN, and collects HTTP requests, responses, and data.

Usage

python3.7 bustaPcap.py [OPTIONS]


Example:
-----------------------
    python3.7 bustaPcap.py -p ./single.pcap -q -o
    python3.7 bustaPcap.py -d ./dir -q True -o
    python3.7 bustaPcap.py -d ./dir -q True -o -q -v


Command Arguments
-----------------------
	--version
						show program's version number and exit

	-h, --help
						show this help message and exit

	-d  --DIR=DIR_PATH
						Directory path that holds all PCAP files for parsing.
						Allowed files within are .pcap, .cap, .pcapng

	-p  --PCAP=PCAP_FILE
						PCAP File that will be parsed. Include whole
						destination path: Allowed file types are: .pcap, .cap,
						.pcapng

	-q  --FQDN=DO_FQDN
						Usage: -q <FALSE|true>    This option finds Fully
						Qualified Domain Names with each IP found

	-v, --VERBOSE
						Usage: -v|--VERBOSE   Verbose setting allowing for
						optional printing to screen

	-o  --OUTPUT=SAVE_FILE
						Usage: -o <filename>    This option saves the output
						into the provided filename


Pip Requirements
-----------------------
	- colorama  0.4.1
	- pathlib   1.0.1
	- pyshark   0.4.2.3