All Projects → microsoft → Etl2pcapng

microsoft / Etl2pcapng

Licence: mit
Utility that converts an .etl file containing a Windows network packet capture into .pcapng format.

Programming Languages

c
50402 projects - #5 most used programming language

Projects that are alternatives of or similar to Etl2pcapng

Wireshark
Read-only mirror of Wireshark's Git repository at https://gitlab.com/wireshark/wireshark. GitHub won't let us disable pull requests. ☞ THEY WILL BE IGNORED HERE ☜ Please upload them at GitLab.
Stars: ✭ 4,009 (+1658.33%)
Mutual labels:  packet-capture, wireshark
Cuishark
A protocol analyzer like a wireshark on CUI. cuishark is using libwireshark to analyze packets. https://cuishark.slankdev.net
Stars: ✭ 208 (-8.77%)
Mutual labels:  packet-capture, wireshark
Node Webshark
webShark UI + API for NodeJS
Stars: ✭ 26 (-88.6%)
Mutual labels:  packet-capture, wireshark
rvi capture
rvictl for Linux and Windows: capture packets sent/received by iOS devices
Stars: ✭ 124 (-45.61%)
Mutual labels:  wireshark, packet-capture
Pyshark
Python wrapper for tshark, allowing python packet parsing using wireshark dissectors
Stars: ✭ 1,286 (+464.04%)
Mutual labels:  packet-capture, wireshark
Linq2db
Linq to database provider.
Stars: ✭ 2,211 (+869.74%)
Mutual labels:  etl
Winshark
A wireshark plugin to instrument ETW
Stars: ✭ 191 (-16.23%)
Mutual labels:  wireshark
Usaspending Api
Server application to serve U.S. federal spending data via a RESTful API
Stars: ✭ 166 (-27.19%)
Mutual labels:  etl
Etl unicorn
数据可视化, 数据挖掘, 数据处理 ETL
Stars: ✭ 156 (-31.58%)
Mutual labels:  etl
Windowsspyblocker
WindowsSpyBlocker 🛡️ is an application written in Go and delivered as a single executable to block spying and tracking on Windows systems.
Stars: ✭ 2,913 (+1177.63%)
Mutual labels:  wireshark
Mercury
Mercury: network metadata capture and analysis
Stars: ✭ 203 (-10.96%)
Mutual labels:  packet-capture
Mongo Es
A MongoDB to Elasticsearch connector
Stars: ✭ 185 (-18.86%)
Mutual labels:  etl
Bender
Bender - Serverless ETL Framework
Stars: ✭ 171 (-25%)
Mutual labels:  etl
Cql
Categorical Query Language IDE
Stars: ✭ 196 (-14.04%)
Mutual labels:  etl
Airbyte
Airbyte is an open-source EL(T) platform that helps you replicate your data in your warehouses, lakes and databases.
Stars: ✭ 4,919 (+2057.46%)
Mutual labels:  etl
Open Semantic Etl
Python based Open Source ETL tools for file crawling, document processing (text extraction, OCR), content analysis (Entity Extraction & Named Entity Recognition) & data enrichment (annotation) pipelines & ingestor to Solr or Elastic search index & linked data graph database
Stars: ✭ 165 (-27.63%)
Mutual labels:  etl
Metl
Metl is a simple, web-based integration platform that allows for several different styles of data integration including messaging, file based Extract/Transform/Load (ETL), and remote procedure invocation via Web Services. Read more at www.jumpmind.com/products/metl/overview
Stars: ✭ 185 (-18.86%)
Mutual labels:  etl
Etlbox
A lightweight ETL (extract, transform, load) library and data integration toolbox for .NET.
Stars: ✭ 203 (-10.96%)
Mutual labels:  etl
Aws Serverless Data Lake Framework
Enterprise-grade, production-hardened, serverless data lake on AWS
Stars: ✭ 179 (-21.49%)
Mutual labels:  etl
Grafter
Linked Data & RDF Manufacturing Tools in Clojure
Stars: ✭ 174 (-23.68%)
Mutual labels:  etl

About

This tool enables you to view ndiscap packet captures with Wireshark.

Windows ships with an inbox packet capture component called "ndiscap," which is implemented as an ETW trace provider. Due to performance problems with the other popular packet capture method (WinPcap, which was included with older versions of Wireshark), ndiscap should be preferred. A capture can be collected with:

netsh trace start capture=yes report=disabled
<repro>
netsh trace stop

The file generated by ndiscap is an etl file, which can be opened by ETW-centric tools like Microsoft Message Analyzer, but cannot be opened by Wireshark, which is the preferred tool for many engineers. Etl2pcapng.exe can convert the etl file to a pcapng file for opening with Wireshark.

Usage

Prebuilt binaries are available in the Releases section: https://github.com/microsoft/etl2pcapng/releases

Run the tool with:

etl2pcapng.exe in.etl out.pcapng

After converting the file, the tool prints a table which shows mappings between Windows interface indices and pcapng interface IDs.

The output pcapng file will have a comment on each packet indicating the PID of the current process when the packet was logged. WARNING: this is frequently not the same as the actual PID of the process which caused the packet to be sent or to which the packet was delivered, since the packet capture provider often runs in a DPC (which runs in an arbitrary process). The user should keep this in mind when using the PID information.

Building

Run in the src directory in a Visual Studio Command Prompt:

msbuild -t:rebuild -p:configuration=release -p:platform=win32

msbuild -t:rebuild -p:configuration=release -p:platform=x64

History

1.5.0 - Write iftype and ifindex into interface description blocks and statically link C runtime so vcredist doesn't need to be installed.

1.4.1 - Fix a bug leading to writing corrupt packets.

1.4.0 - Automatically infer original fragment length if captured fragments were truncated.

1.3.0 - Add a comment to each packet containing the process id (PID).

1.2.0 - Write direction info of each packet (epb_flags).

1.1.0 - Added support for multi-event packets found in traces from Win8 and older.

Contributing

This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.

When you submit a pull request, a CLA bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact [email protected] with any additional questions or comments.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].