pyshark
etl2pcapng
pyshark | etl2pcapng | |
---|---|---|
5 | 7 | |
2,123 | 584 | |
- | 1.4% | |
3.4 | 3.1 | |
27 days ago | about 2 months ago | |
Python | C | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pyshark
-
New IP Osint Tool!
Pyshark: https://github.com/KimiNewt/pyshark Requests: https://github.com/psf/requests Colorama:https://github.com/tartley/colorama
- What do you use to map networks with historical PCAP?
- Wireshark Packet Tracker
- How can I use Python to view incoming network traffic on my network?
- creating my own intrusion detection system (IDS) in python
etl2pcapng
-
Windows server core, packet captured options? Wireshark etc
Copy the ETL file to a workstation, then use etl2pcapng converter from Microsoft. (https://github.com/microsoft/etl2pcapng)
-
IT Pro Tuesday #202 - Wireshark etl Tool, Security Podcast, EOL Database & More
etl2pcapng allows you to view ndiscap packet captures with Wireshark, thus overcoming the Windows use of etl files intended for ETW-centric tools like Microsoft Message Analyzer. NotAnExpert2020 explains, it "converts a netsh trace start/stop trace into something wireshark can read."
-
Share your greatest free tools
https://github.com/microsoft/etl2pcapng - etl2pcapng - converts a netsh trace start/stop trace into something wireshark can read.
- Wireshark Labs
-
sniffing a process?
netsh trace can do this out of the box. With the death of Message Analyzer, the easiest way to get packet data out of the ETL generated is this utility from MS: https://github.com/microsoft/etl2pcapng
-
Capturing network traffic on a PC
Going to say not wireshark. Use the built in native windows packet capture) and convert it to a pcapng for analysis within wireshark with etl2pcapng.
-
A stupid question regarding UDP traffic
If you have an older version of Windows Server that doesn't have pktmon on it you can also use the netsh method to capture to an ETL file. - Netsh trace start#start) - Now it used to be that I would convert the ETL file to .cap using Message Analyzer, but Microsoft has retired it and you can't download it anymore. In good news it appears that Microsoft has actually released a converter, https://github.com/microsoft/etl2pcapng, to do exactly this.
What are some alternatives?
scapy - Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
termshark - A terminal UI for tshark, inspired by Wireshark
Wireshark - Read-only mirror of Wireshark's Git repository at https://gitlab.com/wireshark/wireshark. ⚠️ GitHub won't let us disable pull requests. ⚠️ THEY WILL BE IGNORED HERE ⚠️ Upload them at GitLab instead.
netmon_cli - A simple and lightweight terminal packet sniffer.
nfstream - NFStream: a Flexible Network Data Analysis Framework.
Visual Studio Code - Visual Studio Code
PF_RING - High-speed packet processing framework
netsniff-ng - A Swiss army knife for your daily Linux network plumbing.
hotwire - Hotwire allows you to study network traffic of a few popular protocols in a simple way
esp_wifi_repeater - A full functional WiFi Repeater (correctly: a WiFi NAT Router)
wifite2 - Rewrite of the popular wireless network auditor, "wifite" - original by @derv82
npcap - Nmap Project's Windows packet capture and transmission library