8000 GitHub - sarveshkapre/PCAP_Analyzer
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

sarveshkapre/PCAP_Analyzer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

37 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

PCAP_Analyzer


MOTIVATION

  1. Understand how scapy can be used to interpret pcap files.
  2. Explore and experiment different functions in Scapy.
  3. Find out the OS from pcap packet content using different approach as given below.

HIGH LEVEL APPROACH

There are some signs to find the OS, but none of them are 100% reliable. Look for

  1. Typical values for MSS and Windows size in TCP connections
  2. RTT values: http://www.netresec.com/?page=Blog&month=2011-11&post=Passive-OS-Fingerprinting
  3. Protocols of a certain OS (netbios, etc.)
  4. Sign of certain client software (Browser: User-Agent, Banner, etc.)
  5. TCP source ports used. There are difference of those ranges between different OSes
  6. IP ID and how it changes. There are difference of ID between different OSes

APPROACH FOR OS DETECTION

  1. Extract GET/POST Request.
  2. Look for User-Agent string in HTTP Headers
  3. In User-Agent - find OS
  4. For malicious packets monitor HTTP Status Code - 302 - Redirection
  5. Analyze hexdump to find signatures related to metasploit etc. For example metasploit = 6D 65 74 61 73 70 6C 6F 69 74
  6. Analyze unique strings in hexdump to find OS, services etc.
  7. Identify other network devices like firewalls, switches, router etc.
  8. Use of gnuplot python library

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

0