Skip to content

An open-source, remote-accessible packet sniffer, written in C++ and Angular 2

License

Notifications You must be signed in to change notification settings

arnaudoff/netsky

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Netsky

An open-source, remote-accessible packet sniffer, written in C++ and Angular 2.

Supported protocols

  • 802.3 Ethernet
  • Internet Protocol (RFC 891)
  • Transmission Control Protocol (RFC 793)
  • User Datagram Protocol (RFC 768)
  • Generic payload

Core features

  • Remote sniffing with authentication
  • Shared sniffing (multiple clients are supported)
  • SSL/TLS support
  • Session-based filtering with pcap filters
  • Display filtering through JSQL (searchjs) expressions
  • Hierarchical frame structure visualisation
  • Designed with extensibility in mind

Prerequisites

  • git
  • Compiler with C++11 support
  • CMake >= 3.6.1
  • libpcap-dev
  • libssl-dev
  • libboost-system-dev
  • nodejs >= 6.5.0
  • npm >= 3.10.3
  • web server for serving the client (optional)

Other dependencies will be fetched from git as submodules and from NPM.

Building and running

# Clone the repository

$ git clone https://github.com/arnaudoff/netsky

Building and running the sniffer/server

Note: Before running and building anything, make sure to change the path to the SSL certificates to use accordingly. This is done in netsky/sniffer/config/config.json.

$ cd netsky/sniffer/
$ mkdir build

$ cd build && cmake -DCMAKE_BUILD_TYPE=Release ../src
$ make

# Run the sniffer
$ cd app
$ sudo ./sniffer

Building and running the client

Note: Before running and building anything, make sure to change the IP address and the port of the server configured for the respective environment. That is done in netsky/client/tools/env. Needless to say, if you're using the remote sniffing feature you'd have to put the public IP of your machine in prod.ts so that once served, clients can connect through WebSocket.

$ cd netsky/client/


# Fetch client dependencies to node_modules/
$ npm install


# Run the client in development env
$ npm start


# Copy a production-ready build to dist/prod (optional)
$ npm run build.prod

The above steps were tested with VirtualBox 5.1.14 r112924 on Linux 4.9.8-1-ARCH i686 GNU/Linux (ArchLinux), however, there may be problems with the packages for other distros. If so, feel free to drop an issue.

Other configuration

Other configuration such as the port that the sniffing server should listen on is located in sniffer/config/config.json. Note that if you're using the provided client, you should also change the address/port in the respective environment configuration.

Building the documentation (optional)

The sniffer project has a detailed documentation for most of the classes and methods via Doxygen. It can be generated from the Doxyfile provided.

Serving the client with a web server (optional)

Serving the client is no harder than serving any Angular application. Still, nginx.sample.conf provides a simple configuration for nginx. Configuration for other web servers is similar.

Notes on SSL/TLS

  • Since the sniffer has built-in SSL/TLS support (and using SSL/TLS is practically a requirement), you may need to allow insecure certificates (e.g. chrome://flags/#allow-insecure-localhost) in your browser to trust the sample self-signed certificates that are provided when trying out the application. If you're using it in production, you probably already have a real certificate.
  • Secure WebSocket may sometimes fail if it's not run under https or the certificate is invalid.

About

An open-source, remote-accessible packet sniffer, written in C++ and Angular 2

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages