Re2Pcap is abbreviation for Request2Pcap and Response2Pcap. Community users can quickly create PCAP file using it and test them against Snort rules.
It allow you to quickly create PCAP file for raw HTTP request shown below;
POST /admin/tools/iplogging.cgi HTTP/1.1
Host: 192.168.13.31:80
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0
Accept: text/plain, /; q=0.01
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://192.168.13.31:80/admin/tools/iplogging.html
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Content-Length: 63
Cookie: token=1e9c07e135a15e40b3290c320245ca9a
Connection: close
tcpdumpParams=tcpdump -z reboot -G 2 -i eth0&stateRequest=start
Usage
git clone https://github.com/Cisco-Talos/Re2Pcap.git
cd Re2Pcap/
docker build -t re2pcap .
docker run –rm –cap-add NET_ADMIN -p 5000:5000 re2pcap
OR
docker run –rm –cap-add NET_ADMIN -p 5000:5000 –name re2pcap amitraut/re2pcap
Open localhost:5000 in your web browser to access it or use Re2Pcap-cmd script to interact with it container to get PCAP in current working directory
Also Read – WhatTheHack : A Collection Of Challenge Based Hack
Requirements
Advantages
Dockerfile
FROM alpine
#Get required dependencies and setup for Re2Pcap
RUN echo “http://dl-cdn.alpinelinux.org/alpine/edge/testing” >> /etc/apk/repositories
RUN apk update && apk add python3 tcpdump tcpreplay
RUN pip3 install –upgrade pip
RUN pip3 install pexpect flask requests httpretty requests-toolbelt
COPY Re2Pcap/ /Re2Pcap
RUN cd Re2Pcap && chmod +x Re2Pcap.py
WORKDIR /Re2Pcap
EXPOSE 5000/tcp
#Run application at start of new container
CMD [“/usr/bin/python3”, “Re2Pcap.py”]
Walkthrough
Workflow
As shown in the above image it is Alpine Linux based Python3 application with Flask based web interface
It parses the input data as raw HTTP request or response and actually perfoms client/server interaction while capturing packets. After the interaction it presents the captured packets as PCAP file
Recommendations
Host: somedomain:5000 i.e. port 5000, please change Flask application to run on other port by modifying Re2Pcap.Py app.run call otherwise PCAP will contain Flask application responseLimitations
Accept-Encoding: header Accept-Encoding: identity is added in the reqeust tcprewrite -D option to modify desitnation IP to something else as per your need. You may also use tcpprep and tcprewrite to set other IPs as endpoints. Due to inconsistent result of tcprewrite I used alternative way to set different SRC/DST IPs HTTP/1.1 302 FOUND as response will generated PCAP with maximum possible retries to reach resource specified in Location: header. Plase export the first HTTP stream using wireshark in testing if you do not like the additional noise of other streams Imagine if you had a super-powered assistant who could automatically handle all the boring, repetitive…
Managing files efficiently is a core skill for anyone working in Linux, whether you're a…
Open ports act as communication endpoints between your Linux system and the outside world. Every…
Introduction In today’s cyber threat landscape, protecting endpoints such as computers, smartphones, and tablets from…
Introduction In today's fast-paced cybersecurity landscape, incident response is critical to protecting businesses from cyberattacks.…
Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…