
Research
/Security News
Malicious npm Packages Target WhatsApp Developers with Remote Kill Switch
Two npm packages masquerading as WhatsApp developer libraries include a kill switch that deletes all files if the phone number isn’t whitelisted.
This tool extracts the Compressed Beamforming Report data from a PCAP file and saves it to a JSON file.
This tool extracts the Compressed Beamforming Report data from a PCAP file and saves it to a JSON or CSV file.
python >= 3.9
wireshark >= 4.4.0
cbrext test/pcaps/beamforming.pcap -W test_out.json
-h, --help Show this help message and exit
-d, --dir Extract all PCAP files in a directory
-W, --write <file or dir> Write the extracted data to a file
-sa, --src-addr <wlan.sa> Filter by source address
-su, --single-user Extract SU
-mu, --multi-user Extract MU
-j, --json Write the extracted data to a JSON file (default)
-c, --csv Write the extracted data to a CSV file # in progress
-p, --pcap Write the extracted data to a PCAP file # in progress
-b, --binary Decode the CBR hex to binary
-i, --info Print the CBR info
-l, --length Setting the length of the CBR data
-v, --verbose Print verbose output
-d
cbrext -d tests/pcaps/ -W test_out.json
shell out:
$ cbrext -d tests/pcaps/ -W test_out.json
Processing tests/pcaps/ and generating output...
[ 1/2 ] filtered_4F_0.pcap -> CBR Length: 7900612
[ 2/2 ] filtered_4F_m0.pcap -> CBR Length: 12088706
PCAP Count: 2
Total CBR Length: 19989318
json out:
[
[
"75:2e:a9:68 ...",
"75:2f:69:68 ...",
...
],
[
"69:70:77:f5 ...",
"69:70:77:f5 ...",
...
]
]
-b
cbrext tests/pcaps/filtered_4F_0.pcap -W test_out.json -i -l 2639
shell out:
$ cbrext tests/pcaps/filtered_4F_0.pcap -W test_out.json -i -l 2639
Processing tests/pcaps/filtered_4F_0.pcap and generating output...
Total CBR Length: 7900612
{'2639_2_3_2': {'nc': '2', 'nr': '3', 'min_antenna': '2', 'count': 126}, '2651_2_3_2': {'nc': '2', 'nr': '3', 'min_antenna': '2', 'count': 2153}}
-l
cbrext tests/pcaps/filtered_4F_0.pcap -W test_out.json -i -l 2639
json out:
Note: It is recommended to determine and set an appropriate value to limit the length information of CBRs after analyzing it with the -i
option. Currently, Wireshark has a bug where the CBR length is recognized as 4 bytes longer in portion of packets. Therefore, you can use the -l
option to extract only the desired length and the -i
option to check the number of antennas.
[
"75:2e:a9:68 ...",
"75:2f:69:68 ...",
...
]
python -m pip install .
python -m pip install --upgrade .
python -m unittest discover -s tests
python -m pip uninstall cbrext
Meneghello, Francesca, Rossi, Michele, and Restuccia, Francesco. "DeepCSI: Rethinking Wi-Fi Radio Fingerprinting Through MU-MIMO CSI Feedback Deep Learning." In IEEE International Conference on Distributed Computing Systems, 2022.
See: https://github.com/francescamen/DeepCSI for more details.
FAQs
This tool extracts the Compressed Beamforming Report data from a PCAP file and saves it to a JSON file.
We found that cbrext demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
Two npm packages masquerading as WhatsApp developer libraries include a kill switch that deletes all files if the phone number isn’t whitelisted.
Research
/Security News
Socket uncovered 11 malicious Go packages using obfuscated loaders to fetch and execute second-stage payloads via C2 domains.
Security News
TC39 advances 11 JavaScript proposals, with two moving to Stage 4, bringing better math, binary APIs, and more features one step closer to the ECMAScript spec.