网络流量可配置嗅探,流量包解析,漏洞规则扫描,生成报告. ....搞网络安全这块,还凑合着用吧.
1、环境安装:
   python2.7 django>1.9 mysql mongo
   beautifulsoup4 (4.5.3)
    bs4 (0.0.1)
   certifi (2017.1.23)
    chardet (2.3.0)
     configparser (3.5.0)
    djangorestframework (3.6.2)
    futures (3.0.5)
    Logbook (1.0.0)
    lxml (3.7.3)
    MySQL-python (1.2.5)
     psutil (5.2.1)
     pymongo (3.4.0)
    pyshark (0.3.7.2)
    pytz (2017.2)
    scapy (2.3.3)
    setuptools (1.4.2)
    simplejson (3.10.0)
    singledispatch (3.4.0.3)
    six (1.10.0)
    tornado (4.4.3)
    trollius (1.0.4)
        Werkzeug (0.12.1)
   配置好settings中的DATABASES;
   新建数据库;
   运行python manage.py check无报错;
   运行python manage.py makemigrate && python manage.py migrate 建立表结构
2、配置文件:app01_config
   [example_bpf]#BPF规则示范
   监听物理地址  = ether host 00:00:5e:00:53:00
   监听ARP = ether proto 0x0806
   滤出广播和多播 =  not broadcast and not multicast
   滤出ARP =  not arp
   只要IP4 =  ip
   IPv4地址 = host 192.0.2.1
   只要IPv6 = ip6
   IPv6地址  = host 2001:db8::1
   只要TCP = tcp
   只要UDP = udp
   80端口 = port 80
   TCP80端口 = tcp port 80
   滤出ARP、DNS = not arp and port not 53
   谷歌的非HTTP、SMTP包 = not port 80 and not port 25 and host www.google.org
   [report]#文件下载url,按照自己的IP改
   downloadurl = http://192.168.137.100:8000/
如果提示找不到tshark,运行yum install wireshark
3、配置嗅探项目
4、流量包管理
5、包详情查看
6、漏洞规则录入
7、扫描配置
8、扫描结果
9、选择性生成报告
10、报告下载
11、报告模板

            
  
    
      forked from pythonran/Pcap_tools
    
        
        - 
                Notifications
    
You must be signed in to change notification settings  - Fork 1
 
网络流量可配置嗅探,流量包解析,漏洞规则扫描,生成报告. ....搞网络安全这块,还凑合着用吧
License
blueroutecn/Pcap_tools
Folders and files
| Name | Name | Last commit message  | Last commit date  | |
|---|---|---|---|---|
Repository files navigation
About
网络流量可配置嗅探,流量包解析,漏洞规则扫描,生成报告. ....搞网络安全这块,还凑合着用吧
Resources
License
Stars
Watchers
Forks
Releases
No releases published
              Packages 0
        No packages published 
      
              Languages
- JavaScript 45.9%
 - CSS 35.0%
 - HTML 16.3%
 - Python 2.8%