Elliot Kjerstad and Aaron Baker
This is a small program that was built for network traffic captures (PCAPS)
during the REU internship at DSU. The program analyzes traffic to help
determine protocol usage, ssl/tls versions used, IP to IP communication,
IP to FQDN, and collects HTTP requests, responses, and data.
python3.7 bustaPcap.py [OPTIONS]
Example:
-----------------------
python3.7 bustaPcap.py -p ./single.pcap -q -o
python3.7 bustaPcap.py -d ./dir -q True -o
python3.7 bustaPcap.py -d ./dir -q True -o -q -v
Command Arguments
-----------------------
--version
show program's version number and exit
-h, --help
show this help message and exit
-d --DIR=DIR_PATH
Directory path that holds all PCAP files for parsing.
Allowed files within are .pcap, .cap, .pcapng
-p --PCAP=PCAP_FILE
PCAP File that will be parsed. Include whole
destination path: Allowed file types are: .pcap, .cap,
.pcapng
-q --FQDN=DO_FQDN
Usage: -q <FALSE|true> This option finds Fully
Qualified Domain Names with each IP found
-v, --VERBOSE
Usage: -v|--VERBOSE Verbose setting allowing for
optional printing to screen
-o --OUTPUT=SAVE_FILE
Usage: -o <filename> This option saves the output
into the provided filename
Pip Requirements
-----------------------
- colorama 0.4.1
- pathlib 1.0.1
- pyshark 0.4.2.3