extcap – Packet Capture

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 6 Managing and Administering DNS in Windows Server 2008.
Using Eclipse. Getting Started There are three ways to create a Java project: 1:Select File > New > Project, 2 Select the arrow of the button in the upper.
14.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Chapter Apache Installation in Linux- Mandrake. Acknowledgment The following information has been obtained directly from
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Wireshark Presented By: Hiral Chhaya, Anvita Priyam.
Ch. 5 – Access Points. Overview Access Point Connection.
Hacking the Bluetooth Pairing Authentication Process Graduate Operating System Mini Project Siyuan Jiang and Haipeng Cai.
1 Lab 3 Transport Layer T.A. Youngjoo Han. 2 Transport Layer  Providing logical communication b/w application processes running on different hosts 
Reading Data in Web Pages tMyn1 Reading Data in Web Pages A very common application of PHP is to have an HTML form gather information from a website's.
Overview of Previous Lesson(s) Over View  ASP.NET Pages  Modular in nature and divided into the core sections  Page directives  Code Section  Page.
COEN 252 Computer Forensics
Lab How to Use WANem Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
W. Sliwinski – eLTC – 7March08 1 LSA & Safety – Integration of RBAC and MCS in the LHC control system.
Chapter 9 Scripting RMAN. Background Authors felt that scripting was a topic not covered well Authors wanted to cover both Unix/Linux and Windows environments.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Microsoft FrontPage 2003 Illustrated Complete Finalizing a Web Site.
Client – Server Application Can you create a client server application: The server will be running as a service: does not have a GUI The server will run.
Website Development with PHP and MySQL Saving Data.
CIS Lesson 10 Printers. CIS Lesson 10.
Version How to Use Packet Tracer MarinaMD.
Configuring a Router. Router user interface The Cisco IOS software uses a command-line interface (CLI) as the traditional console environment. This environment.
Overview Managing a DHCP Database Monitoring DHCP
SW REVERSE JEOPARDY Chapter 1 CCNA2 SW Start-up Routing table Routing table Router parts Router parts Choosing a path Choosing a path Addressing Pot.
Agilent Technologies Copyright 1999 H7211A+221 v Capture Filters, Logging, and Subnets: Module Objectives Create capture filters that control whether.
Oracle Data Integrator Agents. 8-2 Understanding Agents.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Network Analyzer :- Introduction to Wireshark. What is Wireshark ? Ethereal Formerly known as Ethereal GUINetwork Protocol Analyzer Wireshark is a GUI.
Networks Part 3: Packet Paths + Wireshark NYU-Poly: HSWP Instructor: Mandy Galante.
Computer Networking.  The basic tool for observing the messages exchanged between executing protocol entities  Captures (“sniffs”) messages being sent/received.
RTD Basic Training. Agenda Control PC Network Connection Setup Configure RTD –RTD License Installation –RTD Environment Configuration –Archives Basic.
Anritsu Automation Platform (AAP) AAP PC Connects to the system via IP connection (system switch) AAP was developed to add features that were requested.
LonWorks Introduction Hwayoung Chae.
INTERNET APPLICATIONS CPIT405 Install a web server and analyze packets.
1 Remote Installation Service Windows 2003 Server Prof. Abdul Hameed.
After 7.1 Last modified
Instructor Materials Chapter 6: Network Layer
Networks Problem Set 3 Due Nov 10 Bonus Date Nov 9
Instructor Materials Chapter 2: Configure a Network Operating System
Chapter 2: Configure a Network Operating System
Lab 2: Packet Capture & Traffic Analysis with Wireshark
Switch Commands Exec Commands Switch#? exec Commands
Data Transport for Online & Offline Processing
Advanced Penetration testing
Networks Problem Set 3 Due Oct 29 Bonus Date Oct 26
100% REAL EXAM QUESTIONS ANSWERS
Fundamental Concepts in Security and its Application Cloud Computing
Introduction to the Junos Operating System
Chapter 6: Network Layer
Chapter 2: Configure a Network Operating System
Access Control Lists CCNA 2 v3 – Module 11
Advanced Penetration testing
Chapter 5: Switch Configuration
16: extcap – Packet Capture beyond libpcap/winpcap
Developer Lightening Talks
Network Analyzer :- Introduction to Wireshark
Training Module Introduction to the TB9100/P25 CG/P25 TAG Customer Service Software (CSS) Describes Release 3.95 for Trunked TB9100 and P25 TAG Release.
WHAT IS WINDOWS MULTIPOINT SERVER 2012?
Remote Computing Services Cloud connection Distributed system
Security Templates Lecture 7.
EBSCOhost Advanced Search Guided Style
How to install and manage exchange server 2010 OP Saklani.
Presentation transcript:

extcap – Packet Capture

If the packets won’t come to Wireshark Wireshark will have to come for the packets

Traditional pipes

How does capture work All capture goes through dumpcap Interfaces use pcap / pcapng as capture utility Close of pipe => end of capture Wireshark asks for the interfaces Dumpcap lists interfaces Starts pipes with main Wireshark for data exchange Read capture data

Pipes to the rescue dumpcap understands pipes Easy right?

What can go wrong Restart / Start / Stop Broken pipe / Broken rights Windows Configuration means restart

Usage Scenarios Data residing on a different network environment Data not being „networky“ at all System events and logs RF environments

extcap

extcap external capture interface First presented at SharkFest US‘13 by Mike Kershaw and Mike Ryan https://sharkfestus.wireshark.org/sharkfest.13/presentations/NAP-11_Expanding- Wireshark-Beyond-Ethernet-and-Network-Interfaces_Kershaw-Ryan.pdf Part of Wireshark since 2.0 Mission statement: Utilize the pipe interface and make a nice gui for it

extcap features Start / Stop / Restart capture from interface Handle interface configuration Handle runtime control

Capture Provide a list of interfaces Provide a list of Configs Macbook:extcap rknall$ ./extcap_example.py --extcap-interfaces extcap {version=1.0}{help=http://www.wireshark.org}{display=Example extcap interface} interface {value=example1}{display=Example interface 1 for extcap} interface {value=example2}{display=Example interface 2 for extcap} Macbook:extcap rknall$ ./extcap_example.py --extcap-interface example1 --extcap-config arg {number=0}{call=--delay}{display=Time delay}{tooltip=Time delay between packages}{type=integer}{range=1,15}{default=5} arg {number=1}{call=--message}{display=Message}{tooltip=Package message content}{type=string}{required=true}{placeholder=Please enter a message here ...} ...

Interface Configuration Various options Text, Integer, Bool, IP Addresses, Passwords (hashed), Date/Time, Files, Radio, Dropdown, Multicheck (parent dependency) Check for Ranges or with RegExp Mandatory fields

Interface Configuration (2) Parameter get‘s stored Restore to defaults possible Help provided via website or local link

Interface configuration (3) Reload functionality (WS 3.0) Reload calls extcap with all filled out parameters

Interface configuration (4) New grouping Makes for easier managment

Control while running Create a toolbar for your interface Live control your capture and change settings Button, Text, Selector, Boolean, Help and Log

Where to go next?

extcap_example.py Python 2.7/3.x driven example Implements all configuration options Implements all control options

Locate the extcap Folder in Wireshark/Help Only global folders available Copy extcap_example.py there

Windows Users Create batch script for execution Command Execution does not evaluate shell scripts Example in the header of extcap_example.py

Adapt the example Let‘s take a look at def extcap_capture(...) Creates a pcap header Encapsulates data in pcap block

C-Based extcap Alternative: c-based extcap utility extap/extcap-base.h Handles all extcap managment stuff for you Ensures correct and working extcap arguments extcap/ssh-base.h Handles ssh connections

About me? Wireshark (well Etheral) Enthusiast since 2006 Core Developer since 2016 Working for B&R Industrial Automation on machine safety applications

Exported PDU The Exported PDU function is basically a link layer type which allows you to add meta information to the packet and have a packet start at any protocol level. Some other uses are: Write decrypted packets Write reassembled packets Instead of User DLT no need to configure DLT.

Exported PDU We can use Exported PDU and text2topcap to design test packets during dissector development. By using the Exported PDU tags to “send” the packet directly to the dissector which can be handy. First we need to create the basic Exported PDU layer.

Crating basic packet Put the following lines into a file 0000 00 0c 00 0c 67 73 6d 5f 61 5f 64 74 61 70 00 00 ..... gsm_a_dtap 67 73 6d 5f 61 5f 64 74 61 70 0010 00 1e 00 04 00 00 00 01 00 00 00 00 08 15 03 And run text2pcap.exe -l 252 Manufacture_frames_exp_pdu.txt Manufacture_frames_exp_pdu.pcapng EXPORTED_PDU Tag: PDU content protocol name (12) Length: 12 Protocol Name: gsm_a_dtap

Crating basic packet Put the following lines into a file 0000 00 0c 00 0c 67 73 6d 5f 61 5f 64 74 61 70 00 00 ..... gsm_a_dtap 67 73 6d 5f 61 5f 64 74 61 70 0010 00 1e 00 04 00 00 00 01 00 00 00 00 08 15 03 And run text2pcap.exe -l 252 Manufacture_frames_exp_pdu.txt Manufacture_frames_exp_pdu.pcapng Tag: Original Frame number (30) Length: 4 Original Frame Number: 1

Crating basic packet Put the following lines into a file 0000 00 0c 00 0c 67 73 6d 5f 61 5f 64 74 61 70 00 00 ..... gsm_a_dtap 67 73 6d 5f 61 5f 64 74 61 70 0010 00 1e 00 04 00 00 00 01 00 00 00 00 08 15 03 And run text2pcap.exe -l 252 Manufacture_frames_exp_pdu.txt Manufacture_frames_exp_pdu.pcapng Tag: End-of-options (0) Length: 0

Test packet 0000 00 0c 00 0c 6e 61 73 2d 35 67 73 00 00 00 00 00 ....nas-5gs..... 0010 00 1e 00 04 00 00 00 01 00 00 00 00 7e 00 3e 57 ..............>A Message type last octet 0x57 Authentication response 0020 78 00 57 0a 01 25 46 00 00 55 71 53 01 d6 10 04 ó....%F..UqS.Ö.. 0030 8e 42 20 10 00 04 20 63 db 24 2f 04 4d aa 62 67 .B n.. cÛ$/.Mªbg 0040 52 22 04 78 78 00 33 78 00 30 00 5e 7b 78 40 04 R"."..0.nf.^{x@. 0050 75 9f 77 77 50 04 5a fa f6 6d b0 2b 03 3d ff ff u.wwP.Zúöm°+.=ÿÿ 0060 2c 04 00 00 00 00 2d 06 00 00 00 00 00 00 c0 7c ,.....-.......À| 0070 00 08 07 00 c0 7c 00 02 00 00 ....À|.... text2pcap.exe -l 252 Manufacture_frames_exp_pdu.txt Manufacture_frames_exp_pdu.pcapng

About me? Work for Ericsson testing IMS systems. Started with Wireshark(Ethereal) in 2003 Core developer since 2005 Made ~50 dissectors GUI work on GTK2 and GTK3