tcpflow
netpeek
Our great sponsors
tcpflow | netpeek | |
---|---|---|
5 | 2 | |
1,642 | 57 | |
- | - | |
3.7 | 10.0 | |
9 months ago | over 2 years ago | |
C++ | Go | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
tcpflow
-
tcpdump is amazing (2016)
> where: timestamp is an optional timestamp of the time that the first packet was seen
https://github.com/simsong/tcpflow/blob/master/doc/tcpflow.1...
.B t
-
Don't skip outgoing traffic
tcpflow
- Tcpflow: TCP/IP Packet Demultiplexer
-
Getting Started with NMAP
Mentioning tcpflow here b/c it's one of the most useful networking related tools I know of that very few people even know about.
What does it do?
It can reassemble TCP packets back into the FULL body of the original message sent. e.g. if you make a HTTP GET request, it will show you the full text in a file stamped with the time, source and dest ips and port.
Things I've found it REALLY useful for:
- migrating a data center
- for some reason, connection works fine on the old DC but seems to time out in weird ways in the new DC
- No one can figure it out
- I suggest using tcpflow
- Turn out there was a setting in the new DC network hardware that was truncating larger packets and the authorization message was just over the threshold
People always say "yeah, but Wireshark" which is true, that's a good tool too. That being said, there is just something about seeing the "raw" text of a message sent by a machine over the wire and being able to see it in text from the command line.
https://github.com/simsong/tcpflow
-
Tracing HTTP Requests with Tcpflow
There seems to be an issue open for this https://github.com/simsong/tcpflow/issues/58
netpeek
-
Application Traffic with eBPF
Isn't this how tcpdump/ngrep/gopacket work? For parsing the HTTP protocol, I find netpeek effective
[1] https://github.com/darshanime/netpeek
-
Tracing HTTP Requests with Tcpflow
There is also netpeek[1] which has better filtering capabilities and UX overall. It supports ngrep like bpf filters which we found useful.
1: https://github.com/darshanime/netpeek
What are some alternatives?
htop - htop - an interactive process viewer
ssldump - ssldump - (de-facto repository gathering patches around the cyberspace)
Forensia - Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
libpnet - Cross-platform, low level networking using the Rust programming language.
tcpreplay - Pcap editing and replay tools for *NIX and Windows - Users please download source from