1
1
# heplify
2
2
heplify is captagents little brother. While it offers a compareable performance the design goal was simplicity.
3
- It's a single binary which you can place on your linux or windows machine. Just run it to capture packets and
4
- send them to Homer. Right now heplify is able to send SIP, DNS, LOG or TLS handshakes into homer. It's able to
3
+ It's a single binary which you can run to capture packets and send them to Homer.
4
+ Right now heplify is able to send SIP, correlated RTCP and very basic DNS, LOG or TLS handshakes into homer. It's able to
5
5
handle fragmented and duplicate packets out of the box.
6
6
<img align =" right " width =" 300 " src =" https://user-images.githubusercontent.com/20154956/30700149-0278a246-9ee7-11e7-8aef-8d68baef554a.png " >
7
7
### Requirements
8
- * libpcap
9
-
10
- On Debian/Ubuntu: sudo apt-get install libpcap-dev
11
- On CentOS/RHEL: yum install libpcap-devel
12
- On Windows: install WinPcap
8
+ * None if you use the binary from the [ releases] ( https://github.com/sipcapture/heplify/releases )
13
9
14
10
### Installation
15
11
Simply grab it from the [ releases] ( https://github.com/sipcapture/heplify/releases )
@@ -18,35 +14,36 @@ chmod +x heplify
18
14
### Usage
19
15
``` bash
20
16
-i Listen on interface
21
- -t Capture types are [af_packet, pcap, file] (default " pcap" )
22
- -m Capture modes [DNS, LOG, SIP, TLS] (default " SIP" )
17
+ -t Capture types are [pcap, af_packet] (default " pcap" )
18
+ -m Capture modes [DNS, LOG, SIP, SIPRTCP, TLS] (default " SIP" )
19
+ -pr Portrange to capture SIP (default " 5060-5090" )
23
20
-hs HEP Server address (default " 127.0.0.1:9060" )
24
- -di Discard uninteresting packets like SIP OPTIONS, HTTP Requests ...
25
- -fi Filter out interesting packets like SIP INVITES, Handshakes ...
26
- -rf Read packets from file. Please use -t file
27
- -wf Write packets to file
21
+ -di Discard uninteresting packets
22
+ -fi Filter interesting packets
23
+ -rf Read packets from pcap file
24
+ -wf Write packets to pcap file
28
25
-e Log to stderr and disable syslog/file output
29
26
-l Log level [debug, info, warning, error] (default " info" )
30
27
```
31
28
32
29
### Examples
33
30
``` bash
34
- # Capture SIP packets on eth2 and send them to Homer under 192.168.1.1:9060
35
- ./heplify -i eth2 -hs " 192.168.1.1:9060"
31
+ # Capture SIP packets on eth2 and send them to 192.168.1.1:9060
32
+ ./heplify -i eth2 -hs 192.168.1.1:9060 &
36
33
37
- # Print default log level to stdout
38
- ./heplify -i eth2 -hs " 192.168.1.1:9060" -e
34
+ # Capture SIP packets on eth2 and send them to 192.168.1.1:9060. Print debug log level to stdout
35
+ ./heplify -i eth2 -hs 192.168.1.1:9060 -e -l debug
39
36
40
- # Print debug log level to stdout
41
- ./heplify -i eth2 -hs " 192.168.1.1:9060" -e -l debug
37
+ # Capture SIP packets with custom port range on eth2 and send them to 192.168.1.1:9060
38
+ ./heplify -i eth2 -pr 6000-6010 - hs 192.168.1.1:9060 &
42
39
43
- # Capture LOG packets on eth2 and send them to Homer under 192.168.1.1:9060
44
- ./heplify -i eth2 -hs " 192.168.1.1:9060" -m LOG
40
+ # Use af_packet to capture SIP and correlated RTCP packets on eth2 and send them to 192.168.1.1:9060
41
+ ./heplify -i eth2 -hs 192.168.1.1:9060 -t af_packet -m SIPRTCP &
45
42
46
43
# Capture SIP packets on eth2 and save them to pcap into current folder
47
- ./heplify -i eth2 -wf capture.pcap
44
+ ./heplify -i eth2 -wf capture.pcap -t af_packet &
48
45
49
- # Read pcap file from current folder and send it's content to Homer under 192.168.1.1:9060
50
- ./heplify -i eth2 -t file - rf capture .pcap -hs " 192.168.1.1:9060"
46
+ # Read example/rtp_rtcp_sip. pcap and send SIP and correlated RTCP packets to 192.168.1.1:9060
47
+ ./heplify -rf example/rtp_rtcp_sip .pcap -m SIPRTCP - hs 192.168.1.1:9060 &
51
48
52
49
```
0 commit comments