analyzer-d4-pibs/README.md

43 lines
1.3 KiB
Markdown
Raw Normal View History

2019-02-01 15:34:33 +01:00
# Passive Identification of BackScatter
Read a pcap file and display potential backscatter traffic on standard output
This is very early stage and subject to change.
# Install dependencies
As there were some changes in libwiretap, at least the version 2.6.3-1 is needed.
``` shell
apt-get install libwiretap-dev
apt-get install libhiredis-dev
2019-02-01 15:40:52 +01:00
apt-get install libwsutil-dev
2019-03-15 15:53:42 +01:00
apt-get install libpcap-dev
apt-get install libglib2.0-dev
2019-02-01 15:34:33 +01:00
make
```
# How to use
``` shell
./pibs -r pcapfile.cap -b
2019-02-11 16:38:30 +01:00
2019-03-19 11:16:38 +01:00
./pibs -u e344c4fb-442e-45a6-92b9-d8e30aeef448 -z 127.0.0.1 -p 6379 -y 2
2019-02-11 16:38:30 +01:00
Consumes the files from the worker queue and write potential backscatter on
standard output. The worker queue should include absolute filenames.
In the example the redis server server is listening on port 6379 on the interface 127.0.0.1.
2019-03-19 11:16:38 +01:00
The redis database 2 is used as specified with the -y option.
2019-02-11 16:38:30 +01:00
The string e344c4fb-442e-45a6-92b9-d8e30aeef448 is the uuid that must be inline with the
worker.
2019-03-18 16:04:54 +01:00
pibs -r source.cap.gz -w backscatter.cap
Read the file source.cap.gz, identify potential backscatter and store it in the
file backscatter.cap to be further analysed with other tools such as wireshark
2019-02-01 15:34:33 +01:00
```
pibs -r pcapfile.cap -s
2019-02-01 15:34:33 +01:00
Read the file source.cap, identify potential backscatter and display the
usage of the used internal hash table. Feature for debugging purpose.