python script to analyse PCAP files, able to extract information about specific IP addresses, guess suspicious IP addresses, able to extract and identify malicious payload and give statistics about top IP addresses, detect reverse shell, used scapy to parse pcap file and pandas to create data frames for statistics, scheduler script to run the script on constant intervals
~$ python .\network_analyser.py --help
usage: network_analyser.py [-h] --pcap <pcap file name> [--client <client IP:port>]
[--server <server IP:port>] [--packet <packet number>]
[--data_frame <src,dst,sport,dport>] [--stats <num,graph>]
[--suspicion <true>] [--payload <get,post>] [--cmd <command injection>]
Network Analyser
optional arguments:
-h, --help show this help message and exit
--pcap <pcap file name> pcap file to parse
--client <client IP:port> clients IP and port
--server <server IP:port> server IP and port
--packet <1> Packet Number
--data_frame <src,dst,sport,dport> All IP Addresses and Ports
--stats <num,graph> Shows Statistics for given pcap file numerical or graphical
--suspicion <true> Investigate for Suspicious IPs
--payload <get,post> Payload Investigation for specific protocols, detect reverse shell
--cmd <command injection> Check raw payloads for Command Injectionpython network_analyser.py --pcap <pcap_file_name> --packet 1 --data_frame src,dst,sport,dport --stats num,graph --suspicion true --payload get,post --cmd truepython scheduler.py --pcap <pcap_file_name> --server_ip <server IP>