Skip to content

Lightweight Packet Capture with packet filtering, writing to pcap file and sending captured traffic to remote target.

License

Notifications You must be signed in to change notification settings

maxng07/packetcap

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 

Repository files navigation

packetcap

Lightweight Packet Capture with filtering option

PacketCap allows microsecond packets in Layer 2, 3 and 4 to be dumped to terminal, operates in promiscuous mode to capture packet length up to 1600 bytes. Supports filtering option to look at specific packets. The filtering syntax is implemented using Linux pcap-filter . PacketCap is lightweight and useful when wireshark or tcpdump is not available. Implemented using gopacket that does the heavy lifting.

Usage: pcap [options...] [device]
Options: 
  -d list all available network devices on machine
  -f pcap filter string to be used
  -h help menu
  
  device - the local device or interface to enable packet capture

Example

To filter ICMP traffic

sudo ./pcapfilter -f "icmp" en0

To filter DNS traffic (udp53 and tcp53)

sudo ./pcapfilter -f "ip and udp port 53 or tcp port 53" en0

To filter telnet traffic

sudo ./pcapfilter -f "ip and port telnet" en0

To filter all traffic

sudo ./pcapfilter en0

How to Install

  1. Download the binaries from Release Page.
  2. For Windows
  • You will need winpcap, you can download it from here
  • To determine the device in Windows System, you can run pcapfilter -d which lists all the devices on the machine. Then use the GUID listed and appending with \\device\\NPF_{GUID} as the device. pcapfilter -f "ip" \\device\\NPF_{GUID}

About

Lightweight Packet Capture with packet filtering, writing to pcap file and sending captured traffic to remote target.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published