Identifying harmful activity on your captured traffic

This Python script utilises Wireshark or TCPdump to analyse network traffic stored in a specified .pcap or .pcapng file. The objective is to detect potential malicious activities and attacks. The script covers a range of suspicious network behaviors, including:

DNS Tunneling
SSH Tunneling
TCP Session Hijacking
SMB Attack
SMTP or DNS Attack
IPv6 Fragmentation Attack
TCP RST Attack
SYN Flood Attack
UDP Flood Attack
Slowloris Attack

Additionally, the script attempts to identify packages containing specific suspicious keywords such as “password,” “login,” “admin,” etc. Detected activities and attacks are displayed in the console.
Usage Instructions:
1. Clone the repository:
git clone https://github.com/alperenugurlu/Network_Assessment.git
2. Install required dependencies:
pip3 install -r requirements.txt
3. Run the script:
python3 Network_Compromise_Assessment.py
4. Enter the path to the .pcap or .pcapng file when prompted.
Example:
Please enter the path to the .pcap or .pcapng file: /root/Desktop/TCP_RST_Attack.pcap
Script Structure:

get_user_input(): Retrieves the path of the .pcap file from the user.
get_all_ip_addresses(capture): Returns a set containing all source and destination IP addresses.
detect_* functions: Used to detect specific attacks and suspicious activities.
main(): Executes the primary operations of the script. It prompts the user for the file path and then analyses the file to identify specified attacks and suspicious activities.

Feel free to explore and enhance the capabilities of the script for a more comprehensive network assessment.
Download Link: Network_Assessment

Latest articles

Related articles