Hello,
I am looking for an opensource / free tool that can parse a large number of pcap files and display the network traffic in a holistic or 30,000 foot level. As mentioned I am collecting pcap files in 100MB chunks and total about 6GB.
Again this is not to collect the data just to interpret it.
I am platform agnostic so windows or linux will do.
I am currently looking at Etherape, but need a few more to chose from. I really don't want to have to use wireshark for such a large task.
Thanks for any opinions in advance!
I can think of half a dozen different ways of parsing and analyzing pcap files, but without knowing the kind of data you're looking for (packet statistics, incidents of particular strings, rebuilding HTTP streams, etc.) and how exactly you want it output for analysis, it's difficult to recommend the appropriate solution.
Wireshark is pretty much the de facto tool for performing packet analysis, outside of specialized scripts written for very specific purposes.
If you're looking at EtherApe, then I assume you need both the ability to get an overall picture of all network traffic with the ability to drill down to the packet level for further analysis, correct? Is EtherApe lacking a specific function you need or are you just asking if anyone knows of anything better with similar functionality? The only other thing which comes to mind is using
Jeff
Chances are there won't be any one single tool that will do everything you want. You can look at the Data Types section on the
luc_4246,
Are you looking for something specific? I ask because if you are then a recommendation may differ.
If you're looking at overall analysis research Netdude.
Alternatively, or in addition to, look at; chaosreader, tcpxtract, and pcap Parser (pcaputils).
Perhaps something here is proves useful!
farmerdude
http//
http//
I would recommend you to take a look at pyflag, which has great network forensics capabilities!
pyflag.net
I think ntop might also consume tcpdump files, and should give you a pretty useful high-level view. I think the flag is "–pcap-log [filename]".
http//