netsniff-ng
etl2pcapng
netsniff-ng | etl2pcapng | |
---|---|---|
2 | 7 | |
1,177 | 586 | |
2.3% | 1.7% | |
0.0 | 3.1 | |
over 1 year ago | 2 months ago | |
C | C | |
GNU General Public License v3.0 or later | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
netsniff-ng
-
What is the correct way to do a git pull, ./configure, make, make install within a dockerfile?
RUN apt-get update && \ apt-get install -y iproute2 iputils-ping iperf3 tcpdump netcat ethtool \ mtr iftop nmap python3 python3-pip joe nano ccache flex bison libnl-3-dev \ libnl-genl-3-dev libnl-route-3-dev libgeoip-dev libnetfilter-conntrack-dev \ libncurses5-dev liburcu-dev libnacl-dev libpcap-dev zlib1g-dev libcli-dev \ libnet1-dev git RUN pip3 install ncclient requests scapy iperf3 RUN mkdir -p python_scripts/ \ mkdir -p packet_samples/ RUN git clone https://github.com/netsniff-ng/netsniff-ng.git COPY packet_samples/ packet_samples/ ADD python_scripts/iperf3_docker_client.py python_scripts/iperf3_docker_client.py ADD python_scripts/iperf3_docker_server.py python_scripts/iperf3_docker_server.py ADD python_scripts/ping_test.py python_scripts/ping_test.py RUN /netsniff-ng/configure WORKDIR /netsniff-ng RUN /netsniff-ng/configure && \ make && \ make install && WORKDIR / ENTRYPOINT ["/bin/bash"]
-
Awesome Penetration Testing
netsniff-ng - Swiss army knife for network sniffing.
etl2pcapng
-
Windows server core, packet captured options? Wireshark etc
Copy the ETL file to a workstation, then use etl2pcapng converter from Microsoft. (https://github.com/microsoft/etl2pcapng)
-
IT Pro Tuesday #202 - Wireshark etl Tool, Security Podcast, EOL Database & More
etl2pcapng allows you to view ndiscap packet captures with Wireshark, thus overcoming the Windows use of etl files intended for ETW-centric tools like Microsoft Message Analyzer. NotAnExpert2020 explains, it "converts a netsh trace start/stop trace into something wireshark can read."
-
Share your greatest free tools
https://github.com/microsoft/etl2pcapng - etl2pcapng - converts a netsh trace start/stop trace into something wireshark can read.
- Wireshark Labs
-
sniffing a process?
netsh trace can do this out of the box. With the death of Message Analyzer, the easiest way to get packet data out of the ETL generated is this utility from MS: https://github.com/microsoft/etl2pcapng
-
Capturing network traffic on a PC
Going to say not wireshark. Use the built in native windows packet capture) and convert it to a pcapng for analysis within wireshark with etl2pcapng.
-
A stupid question regarding UDP traffic
If you have an older version of Windows Server that doesn't have pktmon on it you can also use the netsh method to capture to an ETL file. - Netsh trace start#start) - Now it used to be that I would convert the ETL file to .cap using Message Analyzer, but Microsoft has retired it and you can't download it anymore. In good news it appears that Microsoft has actually released a converter, https://github.com/microsoft/etl2pcapng, to do exactly this.
What are some alternatives?
masscan - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
termshark - A terminal UI for tshark, inspired by Wireshark
bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
netmon_cli - A simple and lightweight terminal packet sniffer.
mitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
pyshark - Python wrapper for tshark, allowing python packet parsing using wireshark dissectors
awesome-pcaptools - A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.
Visual Studio Code - Visual Studio Code
pwntools - CTF framework and exploit development library
esp_wifi_repeater - A full functional WiFi Repeater (correctly: a WiFi NAT Router)
Divert - WinDivert: Windows Packet Divert
npcap - Nmap Project's Windows packet capture and transmission library