All Projects → michoo → pci

michoo / pci

Licence: GPL-3.0 License
Packet communication investigator

Programming Languages

python
139335 projects - #7 most used programming language
HTML
75241 projects
shell
77523 projects
Dockerfile
14818 projects

Projects that are alternatives of or similar to pci

Bruteshark
Network Analysis Tool
Stars: ✭ 1,335 (+1528.05%)
Mutual labels:  pcap, neo4j
Red-Rabbit-V4
The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate other peoples tools like the aircrack suite or the wifite framework, it rather has its own code and is raw source with over 270+ options. This framework might just be your everyday key to your workflow
Stars: ✭ 123 (+50%)
Mutual labels:  pcap, pcap-analyzer
captcp
A open source program for TCP analysis of PCAP files
Stars: ✭ 110 (+34.15%)
Mutual labels:  pcap, pcap-analyzer
termshark
A terminal UI for tshark, inspired by Wireshark
Stars: ✭ 7,368 (+8885.37%)
Mutual labels:  pcap, tshark
youtube-or-pornhub
Service identification on ciphered traffic.
Stars: ✭ 26 (-68.29%)
Mutual labels:  pcap, tshark
network-tools
Network Tools
Stars: ✭ 27 (-67.07%)
Mutual labels:  pcap, pcap-analyzer
CIS-Ubuntu-20.04-Ansible
Ansible Role to Automate CIS v1.1.0 Ubuntu Linux 18.04 LTS, 20.04 LTS Remediation
Stars: ✭ 150 (+82.93%)
Mutual labels:  security-audit
boltex
Elixir driver for the neo4j bolt protocol
Stars: ✭ 27 (-67.07%)
Mutual labels:  neo4j
tell-me-your-secrets
Find secrets on any machine from over 120 Different Signatures.
Stars: ✭ 31 (-62.2%)
Mutual labels:  security-audit
ehids
A Linux Host-based Intrusion Detection System based on eBPF.
Stars: ✭ 210 (+156.1%)
Mutual labels:  security-audit
Pentesting
Misc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-70.73%)
Mutual labels:  security-audit
kcare-uchecker
A simple tool to detect outdated shared libraries
Stars: ✭ 174 (+112.2%)
Mutual labels:  security-audit
neo4j-aws-ha-cluster
Neo4j Enterprise HA Cluster on AWS ECS
Stars: ✭ 13 (-84.15%)
Mutual labels:  neo4j
graphql-starter
Node, Express, GraphQL, Neo4j, Mocha and ES6
Stars: ✭ 17 (-79.27%)
Mutual labels:  neo4j
legis-graph
ETL scripts for loading US Congressional data from govtrack.us into Neo4j
Stars: ✭ 48 (-41.46%)
Mutual labels:  neo4j
clair-cicd
Making CoreOS' Clair easily work in CI/CD pipelines
Stars: ✭ 27 (-67.07%)
Mutual labels:  security-audit
seabolt
Neo4j Bolt Connector for C
Stars: ✭ 37 (-54.88%)
Mutual labels:  neo4j
knowledge-graph
Graph Data Visualization Demo| 图数据搜索可视化应用案例
Stars: ✭ 30 (-63.41%)
Mutual labels:  neo4j
talks
Slides, code examples, reference materials, etc. for all technical talks I've given.
Stars: ✭ 11 (-86.59%)
Mutual labels:  neo4j
webshark
🦈 Tool for visualizing packet captures.
Stars: ✭ 41 (-50%)
Mutual labels:  pcap

Packet Communication Investigator

https://github.com/michoo/pci

Simply import network traffic into a graphtool to analyse packet interactions between machines and network on a graph approach to help investigate what's happening on your network. 3 modes are available:

  • pcap packet analysis: if you already have pcap you can upload to a graph database
  • live capture: you can live capture (no history backed up)
  • live ring capture*: same has live capture but keep a ring of pcap file on db/pcap directory.

It will find server name and geolocalize it based on ip (v4)

From neo4j browser available at localhost:7474 Alt text

From www/index.html (auto update every minutes for a 3d visualization) Alt text

nb* in the live ring capture you'll need to modify pyshark project in liveCapture.py line 68

#params += ['-r', '-']

Prerequesites

You'll need:

  • python3
  • docker installed or already a Neo4j installed
  • wireshark and tshark
  • pipenv (like it but you can modify this project to do in other ways)

nb1: Docker

to help running docker I made some scripts for newbies:

  • build.sh to build the image of Neo4j (with the best password ever)
  • start.sh to start a container

nb2: Tshark / Wireshark

If you are getting a ‘Permission Denied’ error when running wireshark or tshark as local user, you can add the user account to wireshark to avoid running pci.py with sudo

// permit all user to analyse traffic (by being part of wireshark's group)
$ sudo dpkg-reconfigure wireshark-common 
// add your local user to analyse traffic
$ sudo usermod -a -G wireshark $USER
// logout and login to update your account
$ gnome-session-quit --logout --no-prompt

How to use it?

1.setup.sh

A script to download geoip database in the right spot

2.start neo4j server (docker)

in neo4j-docker ./build.sh and then ./start.sh

3.run pci.py script

then you can run ./pci.py (pipenv shell!)

  • live Capture: i= interface to monitor (for example, wlp3s0)
./pci.py -i wlp3s0
  • live ring Capture i= interface to monitor (for example, wlp3s0), r= ring option
./pci.py -i wlp3s0 -r
  • pcap analysis: f=path to the file (for example, db/pcap/pci_00001_20191029095803.pcapng )
./pci.py -f db/pcap/pci_00001_20191029095803.pcapng

after you'll see nodes appearing into neo4j browser (http://localhost:7474)

clean.sh

Just a script to clean directories before commit

Faq:

  • Q:What the login/password for neo4j browser (http://localhost:7474)

  • A:it's set to neo4j/password1

  • Q:I don't know neo4j do you have some request examples

  • A:Yes look at the neo4j-script directory (delete all nodes, show last 10min). You can also import manually those file into neo4j (you can find in the ui left menu)

  • Q:In the graph, I don't have Ip shown in the bubbles.

  • A:It's normal. The first time you have to define colours, labels,... Sorry can't do automatically. After that setting it will be ok. Just select the type you want to tune (for ex: machine_local) and select at the bottom of the frame the colour, label, ... It works the same way for the links

Tested

  • debian10
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].