jescholl/packetman

View on GitHub
README.md

Summary

Maintainability
Test Coverage
# Packetman

Advanced tcpdump and Wireshark filter string generator.

[![Gem Version](https://badge.fury.io/rb/packetman.svg)](http://badge.fury.io/rb/packetman)
[![Test Coverage](https://codeclimate.com/github/jescholl/packetman/badges/coverage.svg)](https://codeclimate.com/github/jescholl/packetman/coverage)
[![Inline docs](http://inch-ci.org/github/jescholl/packetman.svg?branch=master)](http://inch-ci.org/github/jescholl/packetman)
[![Circle CI](https://circleci.com/gh/jescholl/packetman.svg?style=svg)](https://circleci.com/gh/jescholl/packetman)
[![Code Climate](https://codeclimate.com/github/jescholl/packetman/badges/gpa.svg)](https://codeclimate.com/github/jescholl/packetman)

Packetman is a packet capture filter generator modeled after [Wireshark's String-Matching Capture Filter Generator](https://www.wireshark.org/tools/string-cf.html) but with a lot more features allowing much finer control over the packets you see.

Features:
  * String-matching (just like Wireshark's tool)
  * bit-string matching
  * hex-string matching
  * easy masking through `?` wildcard characters
  * offsets in bits or bytes
  * use header field name instead of manual offsets
  * application specific queries
  * built-in header reference tables

## Installation

Add this line to your application's Gemfile:

```ruby
gem 'packetman'
```

And then execute:

    $ bundle

Or install it yourself as:

    $ gem install packetman

## Usage

    $ packetman -h
    
    Usage: packetman [OPTIONS] FILTER_STRING
        -p, --protocol PROTO             Transport Protocol (tcp,udp,icmp)
        -t, --transport                  OFFSET starts at transport header instead of data payload
        -r, --radix RADIX                Treat FILTER_STRING as RADIX instead of String
        -o, --offset OFFSET              Offset in bits
        -b, --byte-offset                Use 8-bit bytes instead of bits for offset
        -w, --wildcard [CHARACTER=?]     Treat CHARACTER as single-character wildcard
        -v, --version                    Show version

Create and use a filter string to capture all HTTP GET requests to `/foo/bar`

    $ sudo tcpdump -nA `packetman GET /foo/bar`
    tcpdump: data link type PKTAP
    tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
    listening on pktap, link-type PKTAP (Packet Tap), capture size 262144 bytes
    16:49:04.516409 IP 127.0.0.1.54662 > 127.0.0.1.80: Flags [P.], seq 1488105913:1488105994, ack 1397163988, win 4121, options [nop,nop,TS val 875380202 ecr 2751916352], length 81: HTTP: GET /foo/bar HTTP/1.1
    .....b....j...E.....@.@..S..
    ..:.....PX...SG......75.....
    4-=....@GET /foo/bar HTTP/1.1
    Host: localhost
    User-Agent: curl/7.43.0
    Accept: */*

Hexadecimal string with wildcards

    $ packetman -r 16 -w '?' "A8C401???C200A"
    tcp[((tcp[12:1] & 0xf0) >> 2) + 0:4] & 0xffffff00 = 0xa8c40100 && tcp[((tcp[12:1] & 0xf0) >> 2) + 4:2] & 0x0fff = 0x0c20 && tcp[((tcp[12:1] & 0xf0) >> 2) + 6:1] & 0xff = 0x0a

Base 4 string with wildcards and offset beginning at start of the TCP header

    $ packetman -t -o 3 -r 4 -w i 1223iiii2212
    tcp[0:4] & 0x1fe01fe0 = 0x0d6014c0

## Development

After checking out the repo, run `bin/setup` to install dependencies. Then, run `rake rspec` to run the tests. You can also run `bin/console` for an interactive prompt that will allow you to experiment.

To install this gem onto your local machine, run `bundle exec rake install`. To release a new version, update the version number in `version.rb`, and then run `bundle exec rake release`, which will create a git tag for the version, push git commits and tags, and push the `.gem` file to [rubygems.org](https://rubygems.org).

## Contributing

Bug reports and pull requests are welcome on GitHub at https://github.com/jescholl/packetman.


## License

The gem is available as open source under the terms of the [MIT License](http://opensource.org/licenses/MIT).