Skip to content

Latest commit

 

History

History
91 lines (71 loc) · 3.53 KB

readme.md

File metadata and controls

91 lines (71 loc) · 3.53 KB

pcapsecret v0.2

Pcapsecret injects a secret message into a packet capture (pcap) file. Students use Wireshark or a similar tool to: 1) inspect an output.pcap file to find malformed packets, and 2) reconstruct the secret message by combining the last bytes of each sequential malformed packet.

Update 10/5/24: Use Python 3.7+ and scapy >= 2.5.0 (see requirements.txt for more information).

Description

I made pcapsecret as a game for students in my Comp. Sci. class (but also for fun and to help me learn about scapy!) Here's what it does:

  • Reads packets from input pcap file and extracts basic data (with scapy's pipetools);
    • Does not modify input pcap file.
  • Segments secret message and encapsulates message segments with encap chars (default encap chars: <>);
  • Injects message segments as payloads in random sequential packets;
    • Payloads containing message segments are appended as the last bytes of each chosen packet.
    • Does not overwrite existing payloads or bytes.
  • Provides hints by malforming or modifying packets which contain message segments;
  • Saves packets to output.pcap; and
  • Prints answer key table to console.
  • Hint Types (To Do: add hint types):
    • no_hint (disabled) = add segment as payload, reset size on wire = captured size (difficult to detect).
    • time_hint_small = time changed to outside range of time of pkts +2 or -2 indices away, causing packet to appear out of place.
    • time_hint_large = significant time change (index hint as time_hint_small).
    • length_hint = malformed packet length due to size on wire != captured size.
      • Easier to detect due to Wireshark auto-highlighting this type of malformed packet.
    • addr_hint_1 = MAC and/or IP source and destination are random, not in input pcap file.
    • addr_hint_2 = Ethernet layer contains broadcast mac address in source and destination.
  • For fun, try using a shortened url as the secret message.

Getting Started

Cloning and Environment Setup

  • Linux:
    Libpcap required, but is already provided in many distributions.
git clone https://github.com/FrozenBurrito/pcapsecret.git
cd pcapsecret
python -m venv .
source bin/activate
pip install -r requirements.txt
git clone https://github.com/FrozenBurrito/pcapsecret.git
cd pcapsecret
python -m venv .
scripts\activate.bat 
pip install -r requirements.txt

Running pcapsecret with Python 3.7+

python pcapsecret.py input.pcap "Secret Message Test!"

Usage Information

python pcapsecret.py --help

Help

Let me know if you have any questions or suggestions!

Authors

J Mo, frozenburrito

Version History

  • 0.1
    • It works!
  • 0.2
    • Updated dependencies for compatibility with Python 3.7+
    • Error handling for empty (None type) input_filename and secret_message

License

This project is licensed under the MIT License. See the LICENSE.md file for details.

Helpful Libraries

Helpful Sources