Skip to content

kpingul/packetsniffer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

packetsniffer

Simple and useful sniffer that captures traffic based on given preferences.

Another Sniffer?

The goal of this project was to extend my knowledge around networking and the significance of packet analysis on the defensive side of things.

Packet Visualizer

This feature was inspired by the Logontracer project by JPCERTCC. In this example, we're showing some outbound traffic on a host. Eventually, we will be able to show more packet data like protocols, payload information, packet length, TTL, etc. And in the future, we will add an option where you can upload pcap files and will utilize this visualizer to show network activity.

packet-sniffer

Features

  • Interactive CLI

  • Packet capture

  • PCAP file analysis

Dependencies

WINPCAP - must download driver to prevent any DLL issues

Plaform support

Windows 8/8.1/10

Installation

Go version 1.17.6+

Commands

Usage:

go run packetsniffer.go <flag>

--web <string>

Yes/no for web server and GUI ( localhost:8090 )

--filepath <path>

Path to the pcap file to analyze

--protocol <string>

Protocol either TCP or UDP

--port <int>

Port ranges from 1-65535

--time <int>

How long (in seconds) to run the sniffer

--help

Show help

--version

Show current version

Short term goals

  • Create a threat detection service

    • based on ip addresses and domains
    • checks whether a workstation visited a potentially suspicious or malicious website
    • internal host to host communication
    • utlize free threat intel feeds and open source APIs
    • scheduling mechanism to update feeds
  • Create a UI for pcap file analysis

    • can be used by incident response and SOC teams to find any suspicious network activities on a workstation.

Further down the road goals... adding more intelligence

  • Configuration to capture traffic based on a set of rules like:

    • CPU resource spikes and deviates from baseline
  • Firewall integrations to block suspicious communcation paths