![Oracle Drags Its Feet in the JavaScript Trademark Dispute](https://cdn.sanity.io/images/cgdhsj6q/production/919c3b22c24f93884c548d60cbb338e819ff2435-1024x1024.webp?w=400&fit=max&auto=format)
Security News
Oracle Drags Its Feet in the JavaScript Trademark Dispute
Oracle seeks to dismiss fraud claims in the JavaScript trademark dispute, delaying the case and avoiding questions about its right to the name.
The jspcap
project is an open source Python program focus on PCAP parsing and analysis, which works as a stream PCAP file extractor. With support of jsformat
, it shall support multiple output report formats.
Note that the whole project only supports Python 3.6 or later.
jspcap
is an independent open source library, using only jsformat
as its formatted output dumper.
There is a project called
jspcapy
works onjspcap
, which is a command line tool for PCAP extraction.
Unlike popular PCAP file extractors, such as Scapy
, dpkt
, pyshark
, and etc, jspcap
uses streaming strategy to read input files. That is to read frame by frame, decrease occupation on memory, as well as enhance efficiency in some way.
In jspcap
, all files can be described as following six parts.
jspcap.foundation
) -- synthesise file I/O and protocol analysis, coordinate information exchange in all network layersjspcap.interface
) -- user interface for the jspcap
library, which standardise and simplify the usage of this libraryjspcap.reassembly
) -- base on algorithms described in RFC 815
, implement datagram reassembly of IP and TCP packetsjspcap.ipsuite
) -- collection of constructors for Internet Protocol Suitejspcap.protocols
) -- collection of all protocol family, with detail implementation and methodsjspcap.utilities
) -- collection of four utility functions and classesjspcap.corekit
) -- core utilities for jspcap
implementationjspcap.dumpkit
) -- dump utilities for jspcap
implementation Besides, due to complexity of jspcap
, its extraction procedure takes around 0.01 seconds per packet, which is not ideal enough. Thus, jspcap
introduced alternative extraction engines to accelerate this procedure. By now, jspcap
supports Scapy
, DPKT
, and PyShark
. Plus, jspcap
supports two strategies of multiprocessing (server
& pipeline
). For more information, please refer to the document.
Engine | Performance (seconds per packet) |
---|---|
default | 0.014525251388549805 |
server | 0.12124489148457845 |
pipeline | 0.014450424114863079 |
scapy | 0.002443440357844035 |
dpkt | 0.0003609057267506917 |
pyshark | 0.0792640733718872 |
Note that
jspcap
only supports Python versions since 3.6
Simply run the following to install the latest from PyPI:
pip install jspcap
Or install from the git repository:
$ git clone https://github.com/JarryShaw/jspcap.git
$ python setup.py install
NAME | DESCRIPTION |
---|---|
extract | extract a PCAP file |
analyse | analyse application layer packets |
reassemble | reassemble fragmented datagrams |
trace | trace TCP packet flows |
NAME | DESCRIPTION |
---|---|
JSON | JavaScript Object Notation (JSON) format |
PLIST | macOS Property List (PLIST) format |
TREE | Tree-View text format |
PCAP | PCAP format |
NAME | DESCRIPTION |
---|---|
RAW | no specific layer |
LINK | data-link layer |
INET | internet layer |
TRANS | transport layer |
APP | application layer |
NAME | DESCRIPTION |
---|---|
jsPCAP | the default engine |
MPServer | the multiprocessing engine with server process strategy |
MPPipeline | the multiprocessing engine with pipeline strategy |
DPKT | the DPKT engine |
Scapy | the Scapy engine |
PyShark | the PyShark engine |
NAME | DESCRIPTION |
---|---|
Raw | Raw Packet Data |
ARP | Address Resolution Protocol |
Ethernet | Ethernet Protocol |
L2TP | Layer Two Tunnelling Protocol |
OSPF | Open Shortest Path First |
RARP | Reverse Address Resolution Protocol |
VLAN | 802.1Q Customer VLAN Tag Type |
AH | Authentication Header |
HIP | Host Identity Protocol |
HOPOPT | IPv6 Hop-by-Hop Options |
IP | Internet Protocol |
IPsec | Internet Protocol Security |
IPv4 | Internet Protocol version 4 |
IPv6 | Internet Protocol version 6 |
IPv6_Frag | Fragment Header for IPv6 |
IPv6_Opts | Destination Options for IPv6 |
IPv6_Route | Routing Header for IPv6 |
IPX | Internetwork Packet Exchange |
MH | Mobility Header |
TCP | Transmission Control Protocol |
UDP | User Datagram Protocol |
HTTP | Hypertext Transfer Protocol |
Documentation can be found in submodules of jspcap
. Or, you may find usage sample in the test
folder. For further information, please refer to the source code -- the docstrings should help you :)
ps: help
function in Python should always help you out.
The following part was originally described in
jspcapy
, which is now deprecated and merged into this repository.
As it shows in the help manual, it is quite easy to use:
$ jspcapy --help
usage: jspcapy [-h] [-V] [-o file-name] [-f format] [-j] [-p] [-t] [-a] [-v]
[-F] [-E PKG] [-P PROTOCOL] [-L LAYER]
input-file-name
PCAP file extractor and formatted exporter
positional arguments:
input-file-name The name of input pcap file. If ".pcap" omits, it will
be automatically appended.
optional arguments:
-h, --help show this help message and exit
-V, --version show program's version number and exit
-o file-name, --output file-name
The name of input pcap file. If format extension
omits, it will be automatically appended.
-f format, --format format
Print a extraction report in the specified output
format. Available are all formats supported by
jsformat, e.g.: json, plist, and tree.
-j, --json Display extraction report as json. This will yield
"raw" output that may be used by external tools. This
option overrides all other options.
-p, --plist Display extraction report as macOS Property List
(plist). This will yield "raw" output that may be used
by external tools. This option overrides all other
options.
-t, --tree Display extraction report as tree view text. This will
yield "raw" output that may be used by external tools.
This option overrides all other options.
-a, --auto-extension If output file extension omits, append automatically.
-v, --verbose Show more information.
-F, --files Split each frame into different files.
-E PKG, --engine PKG Indicate extraction engine. Note that except default
or jspcap engine, all other engines need support of
corresponding packages.
-P PROTOCOL, --protocol PROTOCOL
Indicate extraction stops after which protocol.
-L LAYER, --layer LAYER
Indicate extract frames until which layer.
Under most circumstances, you should indicate the name of input PCAP file (extension may omit) and at least, output format (json
, plist
, or tree
). Once format unspecified, the name of output file must have proper extension (*.json
, *.plist
, or *.txt
), otherwise FormatError
will raise.
As for verbose
mode, detailed information will print while extraction (as following examples). And auto-extension
flag works for the output file, to indicate whether extensions should be appended.
As described in test
folder, jspcap
is quite easy to use, with simply three verbs as its main interface. Several scenarios are shown as below.
extract a PCAP file and dump the result to a specific file (with no reassembly)
import jspcap
# dump to a PLIST file with no frame storage (property frame disabled)
plist = jspcap.extract(fin='in.pcap', fout='out.plist', format='plist', store=False)
# dump to a JSON file with no extension auto-complete
json = jspcap.extract(fin='in.cap', fout='out.json', format='json', extension=False)
# dump to a folder with each tree-view text file per frame
tree = jspcap.extract(fin='in.pcap', fout='out', format='tree', files=True)
extract a PCAP file and fetch IP packet (both IPv4 and IPv6) from a frame (with no output file)
>>> import jspcap
>>> extraction = jspcap.extract(fin='in.pcap', nofile=True)
>>> frame0 = extraction.frame[0]
# check if IP in this frame, otherwise ProtocolNotFound will be raised
>>> flag = jspcap.IP in frame0
>>> tcp = frame0[jspcap.IP] if flag else None
extract a PCAP file and reassemble TCP payload (with no output file nor frame storage)
import jspcap
# set strict to make sure full reassembly
extraction = jspcap.extract(fin='in.pcap', store=False, nofile=True, tcp=True, strict=True)
# print extracted packet if HTTP in reassembled payloads
for packet in extraction.reassembly.tcp:
for reassembly in packet.packets:
if jspcap.HTTP in reassembly.protochain:
print(reassembly.info)
The CLI (command line interface) of jspcap
has two different access.
jspcapy
directly (as shown in samples)python -m jspcap [...]
works exactly the same as aboveHere are some usage samples:
Xcode
has special support for this format)$ jspcapy in --format plist --verbose
🚨Loading file 'in.pcap'
- Frame 1: Ethernet:IPv6:ICMPv6
- Frame 2: Ethernet:IPv6:ICMPv6
- Frame 3: Ethernet:IPv4:TCP
- Frame 4: Ethernet:IPv4:TCP
- Frame 5: Ethernet:IPv4:TCP
- Frame 6: Ethernet:IPv4:UDP
🍺Report file stored in 'out.plist'
$ jspcapy in --output out.json --verbose
🚨Loading file 'in.pcap'
- Frame 1: Ethernet:IPv6:ICMPv6
- Frame 2: Ethernet:IPv6:ICMPv6
- Frame 3: Ethernet:IPv4:TCP
- Frame 4: Ethernet:IPv4:TCP
- Frame 5: Ethernet:IPv4:TCP
- Frame 6: Ethernet:IPv4:UDP
🍺Report file stored in 'out.json'
$ jspcapy in --output out --format tree --verbose
🚨Loading file 'in.pcap'
- Frame 1: Ethernet:IPv6:ICMPv6
- Frame 2: Ethernet:IPv6:ICMPv6
- Frame 3: Ethernet:IPv4:TCP
- Frame 4: Ethernet:IPv4:TCP
- Frame 5: Ethernet:IPv4:TCP
- Frame 6: Ethernet:IPv4:UDP
🍺Report file stored in 'out'
Raw
packetjspcapy
FAQs
The `jspcap` module is deprecated and renamed as `pypcapkit`.
We found that jspcap demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Oracle seeks to dismiss fraud claims in the JavaScript trademark dispute, delaying the case and avoiding questions about its right to the name.
Security News
The Linux Foundation is warning open source developers that compliance with global sanctions is mandatory, highlighting legal risks and restrictions on contributions.
Security News
Maven Central now validates Sigstore signatures, making it easier for developers to verify the provenance of Java packages.