PCAP Walker is a script for analyzing pcap/pcapng network traffic capture files. It extracts various types of network traffic, searches for specific keywords in packets, checks for known malicious domains, and finds known vulnerabilities (not implemented yet)
Features
Analyze HTTP, DNS, SMTP, FTP, SSH, and Telnet traffic.
Lookup of every IP involved in the communication
Country
City
Postal Code
Latitude
Longitude
Organization Name
Search for specific keywords in packets.
Check for potential malware communication based on known malicious domains.
Security scan
Deprecated or insecure protocols
Vulnerable cipher suites
Easily customizable patterns for keyword search.
Requirements
Go
tshark (Wireshark command-line utility)
A pcap/pcapng network traffic capture file to analyze
Optional: A patterns.txt file containing specific keywords to search for in packets
GeoIP2 Reader
Download the geoip2-golang package, which provides an interface to the MaxMind GeoIP2 and GeoLite2 databases:
go get -u github.com/oschwald/geoip2-golang
Download the free GeoLite2 City and GeoLite2 ASN databases from MaxMind's website. You need to sign up for a free account to access the download.
Extract the .tar.gz files:
tar -xzvf GeoLite2-City_<todaysdate>.tar.gz && mv GeoLite2-City_<todaysdate>/GeoLite2-City.mmdb ~/pcapwalker/data/
tar -xzvf GeoLite2-ASN_<todaysdate>.tar.gz && mv GeoLite2-ASN_<todaysdate>/GeoLite2-ASN.mmdb ~/pcapwalker/data/
Usage
Makefile build
./pcapwalker [path to pcap/pcapng file] [optional: name of the output file]