Skip to content

Commit d4cff29

Browse files
committed
Readme
1 parent a70b0c9 commit d4cff29

File tree

1 file changed

+21
-24
lines changed

1 file changed

+21
-24
lines changed

README.md

+21-24
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,11 @@
11
# heplify
22
heplify is captagents little brother. While it offers a compareable performance the design goal was simplicity.
3-
It's a single binary which you can place on your linux or windows machine. Just run it to capture packets and
4-
send them to Homer. Right now heplify is able to send SIP, DNS, LOG or TLS handshakes into homer. It's able to
3+
It's a single binary which you can run to capture packets and send them to Homer.
4+
Right now heplify is able to send SIP, correlated RTCP and very basic DNS, LOG or TLS handshakes into homer. It's able to
55
handle fragmented and duplicate packets out of the box.
66
<img align="right" width="300" src="https://user-images.githubusercontent.com/20154956/30700149-0278a246-9ee7-11e7-8aef-8d68baef554a.png">
77
### Requirements
8-
* libpcap
9-
10-
On Debian/Ubuntu: sudo apt-get install libpcap-dev
11-
On CentOS/RHEL: yum install libpcap-devel
12-
On Windows: install WinPcap
8+
* None if you use the binary from the [releases](https://github.com/sipcapture/heplify/releases)
139

1410
### Installation
1511
Simply grab it from the [releases](https://github.com/sipcapture/heplify/releases)
@@ -18,35 +14,36 @@ chmod +x heplify
1814
### Usage
1915
```bash
2016
-i Listen on interface
21-
-t Capture types are [af_packet, pcap, file] (default "pcap")
22-
-m Capture modes [DNS, LOG, SIP, TLS] (default "SIP")
17+
-t Capture types are [pcap, af_packet] (default "pcap")
18+
-m Capture modes [DNS, LOG, SIP, SIPRTCP, TLS] (default "SIP")
19+
-pr Portrange to capture SIP (default "5060-5090")
2320
-hs HEP Server address (default "127.0.0.1:9060")
24-
-di Discard uninteresting packets like SIP OPTIONS, HTTP Requests ...
25-
-fi Filter out interesting packets like SIP INVITES, Handshakes ...
26-
-rf Read packets from file. Please use -t file
27-
-wf Write packets to file
21+
-di Discard uninteresting packets
22+
-fi Filter interesting packets
23+
-rf Read packets from pcap file
24+
-wf Write packets to pcap file
2825
-e Log to stderr and disable syslog/file output
2926
-l Log level [debug, info, warning, error] (default "info")
3027
```
3128

3229
### Examples
3330
```bash
34-
# Capture SIP packets on eth2 and send them to Homer under 192.168.1.1:9060
35-
./heplify -i eth2 -hs "192.168.1.1:9060"
31+
# Capture SIP packets on eth2 and send them to 192.168.1.1:9060
32+
./heplify -i eth2 -hs 192.168.1.1:9060 &
3633

37-
# Print default log level to stdout
38-
./heplify -i eth2 -hs "192.168.1.1:9060" -e
34+
# Capture SIP packets on eth2 and send them to 192.168.1.1:9060. Print debug log level to stdout
35+
./heplify -i eth2 -hs 192.168.1.1:9060 -e -l debug
3936

40-
# Print debug log level to stdout
41-
./heplify -i eth2 -hs "192.168.1.1:9060" -e -l debug
37+
# Capture SIP packets with custom port range on eth2 and send them to 192.168.1.1:9060
38+
./heplify -i eth2 -pr 6000-6010 -hs 192.168.1.1:9060 &
4239

43-
# Capture LOG packets on eth2 and send them to Homer under 192.168.1.1:9060
44-
./heplify -i eth2 -hs "192.168.1.1:9060" -m LOG
40+
# Use af_packet to capture SIP and correlated RTCP packets on eth2 and send them to 192.168.1.1:9060
41+
./heplify -i eth2 -hs 192.168.1.1:9060 -t af_packet -m SIPRTCP &
4542

4643
# Capture SIP packets on eth2 and save them to pcap into current folder
47-
./heplify -i eth2 -wf capture.pcap
44+
./heplify -i eth2 -wf capture.pcap -t af_packet &
4845

49-
# Read pcap file from current folder and send it's content to Homer under 192.168.1.1:9060
50-
./heplify -i eth2 -t file -rf capture.pcap -hs "192.168.1.1:9060"
46+
# Read example/rtp_rtcp_sip.pcap and send SIP and correlated RTCP packets to 192.168.1.1:9060
47+
./heplify -rf example/rtp_rtcp_sip.pcap -m SIPRTCP -hs 192.168.1.1:9060 &
5148

5249
```

0 commit comments

Comments
 (0)