简介
Editcap 是 Wireshark 程序安装时附带的可选工具之一,用于编辑数据包文件的命令行工具。
editcap [ -a <frame:comment> ] [ -A <start time> ] [ -B <stop time> ] [ -c <packets per file> ] [ -C [offset:]<choplen> ] [ -E <error probability> ] [ -F <file format> ] [ -h ] [ -i <seconds per file> ] [ -o <change offset> ] [ -L ] [ -r ] [ -s <snaplen> ] [ -S <strict time adjustment> ] [ -t <time adjustment> ] [ -T <encapsulation type> ] [ -v ] [ --inject-secrets <secrets type>,<file> ] [ --discard-all-secrets ] [ --capture-comment <comment> ] [ --discard-capture-comment ] infile outfile [ packet#[-packet#] … ]editcap -d -D <dup window> -w <dup time window> [ -v ] [ -I <bytes to ignore> ] [ --skip-radiotap-header ] infile outfileeditcap [ -V ]
描述
Editcap 是一个从文件读取部分或所有捕获数据包的程序,可选地以各种方式转换它们,并将结果数据包写入输出文件。缺省情况下,它从输入文件中读取所有数据包,并以 pcapng 文件格式写进输出文件。
Editcap 的几个常见功能:
可以按时间、长度等截取数据包。
可以用来删除重复的数据包,包括用来控制用于重复比较的包窗口或相对时间窗口。
可以用来编辑数据包的描述。
可以检测、读取和写入 Wireshark 支持的相同捕获文件。
可以用几种输出格式编写文件。
选项
$ editcapUsage: editcap [options] ... <infile> <outfile> [ <packet#>[-<packet#>] ... ]<infile> and <outfile> must both be present.A single packet or a range of packets can be selected.Packet selection:-r keep the selected packets; default is to delete them.-A <start time> only read packets whose timestamp is after (or equalto) the given time.-B <stop time> only read packets whose timestamp is before thegiven time.Time format for -A/-B options isYYYY-MM-DDThh:mm:ss[.nnnnnnnnn][Z|+-hh:mm]Unix epoch timestamps are also supported.Duplicate packet removal:--novlan remove vlan info from packets before checking for duplicates.-d remove packet if duplicate (window == 5).-D <dup window> remove packet if duplicate; configurable <dup window>.Valid <dup window> values are 0 to 1000000.NOTE: A <dup window> of 0 with -v (verbose option) isuseful to print MD5 hashes.-w <dup time window> remove packet if duplicate packet is found EQUAL TO ORLESS THAN <dup time window> prior to current packet.A <dup time window> is specified in relative seconds(e.g. 0.000001).NOTE: The use of the 'Duplicate packet removal' options withother editcap options except -v may not always work as expected.Specifically the -r, -t or -S options will very likely NOT have thedesired effect if combined with the -d, -D or -w.--skip-radiotap-header skip radiotap header when checking for packet duplicates.Useful when processing packets captured by multiple radioson the same channel in the vicinity of each other.Packet manipulation:-s <snaplen> truncate each packet to max. <snaplen> bytes of data.-C [offset:]<choplen> chop each packet by <choplen> bytes. Positive valueschop at the packet beginning, negative values at thepacket end. If an optional offset precedes the length,then the bytes chopped will be offset from that value.Positive offsets are from the packet beginning,negative offsets are from the packet end. You can usethis option more than once, allowing up to 2 choppingregions within a packet provided that at least 1choplen is positive and at least 1 is negative.-L adjust the frame (i.e. reported) length when choppingand/or snapping.-t <time adjustment> adjust the timestamp of each packet.<time adjustment> is in relative seconds (e.g. -0.5).-S <strict adjustment> adjust timestamp of packets if necessary to ensurestrict chronological increasing order. The <strictadjustment> is specified in relative seconds withvalues of 0 or 0.000001 being the most reasonable.A negative adjustment value will modify timestamps sothat each packet's delta time is the absolute valueof the adjustment specified. A value of -0 will setall packets to the timestamp of the first packet.-E <error probability> set the probability (between 0.0 and 1.0 incl.) thata particular packet byte will be randomly changed.-o <change offset> When used in conjunction with -E, skip some bytes from thebeginning of the packet. This allows one to preserve somebytes, in order to have some headers untouched.--seed <seed> When used in conjunction with -E, set the seed to use forthe pseudo-random number generator. This allows one torepeat a particular sequence of errors.-I <bytes to ignore> ignore the specified number of bytes at the beginningof the frame during MD5 hash calculation, unless theframe is too short, then the full frame is used.Useful to remove duplicated packets taken onseveral routers (different mac addresses forexample).e.g. -I 26 in case of Ether/IP will ignoreether(14) and IP header(20 - 4(src ip) - 4(dst ip)).-a <framenum>:<comment> Add or replace comment for given frame numberOutput File(s):-c <packets per file> split the packet output to different files based onuniform packet counts with a maximum of<packets per file> each.-i <seconds per file> split the packet output to different files based onuniform time intervals with a maximum of<seconds per file> each.-F <capture type> set the output file type; default is pcapng.An empty "-F" option will list the file types.-T <encap type> set the output file encapsulation type; default is thesame as the input file. An empty "-T" option willlist the encapsulation types.--inject-secrets <type>,<file> Insert decryption secrets from <file>. Listsupported secret types with "--inject-secrets help".--discard-all-secrets Discard all decryption secrets from the input filewhen writing the output file. Does not discardsecrets added by "--inject-secrets" in the samecommand line.--capture-comment <comment>Add a capture file comment, if supported.--discard-capture-commentDiscard capture file comments from the input filewhen writing the output file. Does not discardcomments added by "--capture-comment" in the samecommand line.Miscellaneous:-h display this help and exit.-v verbose output.If -v is used with any of the 'Duplicate PacketRemoval' options (-d, -D or -w) then Packet lengthsand MD5 hashes are printed to standard-error.-V, --version print version information and exit.
实例
以下以实例讲解各选项的作用,测试跟踪文件主要信息如下。
$ capinfos test.pcapngFile name: test.pcapngFile type: Wireshark/... - pcapngFile encapsulation: EthernetFile timestamp precision: microseconds (6)Packet size limit: file hdr: (not set)Number of packets: 20 kFile size: 9213 kBData size: 8530 kBCapture duration: 37.528437 secondsFirst packet time: 2021-08-15 21:34:27.791910Last packet time: 2021-08-15 21:35:05.320347Data byte rate: 227 kBpsData bit rate: 1818 kbpsAverage packet size: 419.22 bytesAverage packet rate: 542 packets/sSHA256: 03cdf99c02a73c3a0ada4f857eaffa587fd78d081cc8cd4e0c7b79f1587086faRIPEMD160: 78696db33a42825bb42a7c63d0fc6053cc88e851SHA1: 7c9d9db15cfa4c237c16289862e9b1cde08a760fStrict time order: FalseCapture hardware: Intel(R) Xeon(R) Gold 6226R CPU @ 2.90GHz (with SSE4.2)Capture oper-sys: 64-bit Windows 10 (1809), build 17763Capture application: Dumpcap (Wireshark) 3.4.7 (v3.4.7-0-ge42cbf6a415f)Capture comment: testNumber of interfaces in file: 1Interface #0 info:Name = DeviceNPF_{15DAC5F9-EEF5-4A7E-A590-E0968FC225A4}Description = Ethernet0Encapsulation = Ethernet (1 - ether)Capture length = 262144Time precision = microseconds (6)Time ticks per second = 1000000Time resolution = 0x06Operating system = 64-bit Windows 10 (1809), build 17763Number of stat entries = 1Number of packets = 20348
Packet selection
数据包选取选项,主要包括以下:
Packet selection:-r keep the selected packets; default is to delete them.-A <start time> only read packets whose timestamp is after (or equalto) the given time.-B <stop time> only read packets whose timestamp is before thegiven time.Time format for -A/-B options isYYYY-MM-DDThh:mm:ss[.nnnnnnnnn][Z|+-hh:mm]Unix epoch timestamps are also supported.$ editcap -r test.pcapng test1.pcapng 1-10保留 test.pcapng 中 1#-10# 的数据包,然后保存为 test1.pcapng$ editcap -r test.pcapng test1.pcapng 10保留 test.pcapng 中 10# 的数据包,然后保存为 test1.pcapng$ editcap -A "2021-08-15 21:35:00" test.pcapng test1.pcapng从 test.pcapng 中读取指定时间之后的数据包,然后保存为 test1.pcapng$ editcap -B "2021-08-15 21:35:00" test.pcapng test1.pcapng从 test.pcapng 中读取指定时间之前的数据包,然后保存为 test1.pcapng$ editcap -A "2021-08-15 21:34:30" -B "2021-08-15 21:35:00" test.pcapng test1.pcapng从 test.pcapng 中读取指定时间前后的数据包,然后保存为 test1.pcapng
Duplicate packet removal
重复数据包删除选项,主要包括以下:
Duplicate packet removal:--novlan remove vlan info from packets before checking for duplicates.-d remove packet if duplicate (window == 5).-D <dup window> remove packet if duplicate; configurable <dup window>.Valid <dup window> values are 0 to 1000000.NOTE: A <dup window> of 0 with -v (verbose option) isuseful to print MD5 hashes.-w <dup time window> remove packet if duplicate packet is found EQUAL TO ORLESS THAN <dup time window> prior to current packet.A <dup time window> is specified in relative seconds(e.g. 0.000001).NOTE: The use of the 'Duplicate packet removal' options withother editcap options except -v may not always work as expected.Specifically the -r, -t or -S options will very likely NOT have thedesired effect if combined with the -d, -D or -w.--skip-radiotap-header skip radiotap header when checking for packet duplicates.Useful when processing packets captured by multiple radioson the same channel in the vicinity of each other.$ editcap --novlan test.pcapng test1.pcapng跟踪文件实测实际无效果,查询文档或与数据包文件相关,需满足 linux sll + vlan 条件的数据包文件。$ editcap -d test.pcapng test1.pcapng2 packets seen, 1 packet skipped with duplicate window of 5 packets.尝试删除重复的数据包,将当前报文的长度和MD5哈希值与前4个报文进行比较。如果找到匹配,则删除当前报文。这个选项相当于使用选项-D 5。$ editcap -d -D 6 test1.pcapng test2.pcapng6 packets seen, 1 packet skipped with duplicate window of 6 packets.6个窗口,即将当前报文的长度和MD5哈希值与前5个报文进行比较。$ editcap -D 0 -v test1.pcapng test2.pcapngFile test1.pcapng is a InfoVista 5View capture capture file.Packet: 1, Len: 112, MD5 Hash: d60cdd08f3de236cf7a2dc35cb7d6de7Packet: 2, Len: 112, MD5 Hash: 8115aa6990b2064660934f36f1b5baccPacket: 3, Len: 112, MD5 Hash: 1fbf43ee3fb682cb82d5adddf87bb0ccPacket: 4, Len: 112, MD5 Hash: 129fcc09853b16a260b55b92656fb148Packet: 5, Len: 112, MD5 Hash: 4f2a15c3946ab86b6fccf70ad84d57a9Packet: 6, Len: 112, MD5 Hash: d60cdd08f3de236cf7a2dc35cb7d6de76 packets seen, 0 packets skipped with duplicate window of 0 packets.$ editcap -w 0.000015 test.pcapng test2.pcapng6 packets seen, 1 packet skipped with duplicate time window equal to or less than 0.000015000 seconds.$ editcap --skip-radiotap-header当检查数据包重复时跳过 radiotap 头部。因无合适数据包文件,暂无测试。
Packet manipulation
数据包编辑操作选项,主要包括以下:
Packet manipulation:-s <snaplen> truncate each packet to max. <snaplen> bytes of data.-C [offset:]<choplen> chop each packet by <choplen> bytes. Positive valueschop at the packet beginning, negative values at thepacket end. If an optional offset precedes the length,then the bytes chopped will be offset from that value.Positive offsets are from the packet beginning,negative offsets are from the packet end. You can usethis option more than once, allowing up to 2 choppingregions within a packet provided that at least 1choplen is positive and at least 1 is negative.-L adjust the frame (i.e. reported) length when choppingand/or snapping.-t <time adjustment> adjust the timestamp of each packet.<time adjustment> is in relative seconds (e.g. -0.5).-S <strict adjustment> adjust timestamp of packets if necessary to ensurestrict chronological increasing order. The <strictadjustment> is specified in relative seconds withvalues of 0 or 0.000001 being the most reasonable.A negative adjustment value will modify timestamps sothat each packet's delta time is the absolute valueof the adjustment specified. A value of -0 will setall packets to the timestamp of the first packet.-E <error probability> set the probability (between 0.0 and 1.0 incl.) thata particular packet byte will be randomly changed.-o <change offset> When used in conjunction with -E, skip some bytes from thebeginning of the packet. This allows one to preserve somebytes, in order to have some headers untouched.--seed <seed> When used in conjunction with -E, set the seed to use forthe pseudo-random number generator. This allows one torepeat a particular sequence of errors.-I <bytes to ignore> ignore the specified number of bytes at the beginningof the frame during MD5 hash calculation, unless theframe is too short, then the full frame is used.Useful to remove duplicated packets taken onseveral routers (different mac addresses forexample).e.g. -I 26 in case of Ether/IP will ignoreether(14) and IP header(20 - 4(src ip) - 4(dst ip)).-a <framenum>:<comment> Add or replace comment for given frame number$ editcap -s 60 test.pcapng test1.pcapng按 60 字节长度截断数据包。$ editcap -C 12:4 test.pcapng test2.pcapng删除 vlan+---+-------+-----------+---------------+-------------------+| 5 | 10 | 15 | 20 | 25 |+---+-------+-----------+---------------+-------------------+删除 10 和 20 区域字节$ editcap -C 5:10 -C -25:-20 test1.pcapng test2.pcapng$ editcap -C 5:10 -C 50:-20 test1.pcapng test2.pcapng$ editcap -C -70:10 -C -25:-20 test1.pcapng test2.pcapng$ editcap -C -70:10 -C 50:-20 test1.pcapng test2.pcapng$ editcap -C 30:20 -C -60:-10 test1.pcapng test2.pcapng$ editcap -C 30:20 -C 15:-10 test1.pcapng test2.pcapng$ editcap -C -45:20 -C -60:-10 test1.pcapng test2.pcapng$ editcap -C -45:20 -C 15:-10 test1.pcapng test2.pcapng$ editcap -L -C 12:4 test.pcapng test2.pcapng无 -L 时,-C 删除 4 字节,最终会显示 Frame 长度 112 ,捕获长度 108;有 -L 时,-C 删除 4 字节,最终会显示 Frame 长度 108 ,捕获长度 108 。$ editcap -t -1 test.pcapng test2.pcapng每个数据包往前调整1s$ editcap -S -1 test.pcapng test2.pcapng每个数据包按 1s 时间顺序递增$ editcap -E -0.2 test.pcapng test2.pcapng设置随机改变一个特定数据包字节的概率为 0.2 。此选项用于模糊测试协议解析器。$ editcap -E -0.2 -o 34 test.pcapng test2.pcapng跳过数据包开头的 34 字节,设置随机改变一个特定数据包字节的概率为 0.2。$ editcap -E -0.2 --seed 10 test.pcapng test2.pcapng设置伪随机数生成器的种子,这允许重复特定的错误序列。$ editcap -d -I 26 test.pcapng test2.pcapng20348 packets seen, 11 packets skipped with duplicate window of 5 packets.在MD5哈希计算时,忽略帧开始的指定字节数,除非该帧太短,否则将使用完整帧。$ editcap -a 1:"test teset" test.pcapng test2.pcapng增加或替换指定数据包的注释
Output File(s)
输出文件选项,主要包括以下:
Output File(s):<packets per file> split the packet output to different files based onuniform packet counts with a maximum ofper file> each.<seconds per file> split the packet output to different files based onuniform time intervals with a maximum ofper file> each.<capture type> set the output file type; default is pcapng.An empty "-F" option will list the file types.<encap type> set the output file encapsulation type; default is thesame as the input file. An empty "-T" option willlist the encapsulation types.<type>,<file> Insert decryption secrets from <file>. Listsupported secret types with "--inject-secrets help".Discard all decryption secrets from the input filewhen writing the output file. Does not discardsecrets added by "--inject-secrets" in the samecommand line.<comment>Add a capture file comment, if supported.--discard-capture-commentDiscard capture file comments from the input filewhen writing the output file. Does not discardcomments added by "--capture-comment" in the samecommand line.editcap -c 4 icmp.pcapng icmp1.pcapng4 个包分成一个文件,从00000开始,然后是它的第一个包的时间戳。如果输入文件不包含时间戳信息,则省略时间戳。icmp.pcapng 中一共 16 个数据包,分割成了 icmp1_00000_20210704113248.pcapng、icmp1_00001_20210704113249.pcapng、icmp1_00002_20210704113250.pcapng、icmp1_00003_20210704113251.pcapng 4个文件。editcap -i 1 icmp.pcapng icmp1.pcapng1 秒。允许使用浮点值(例如0.5)。editcap -Feditcap: The available capture file types for the "-F" flag are:pcap - Wireshark/tcpdump/... - pcappcapng - Wireshark/... - pcapng5views - InfoVista 5View capturebtsnoop - Symbian OS btsnoop- TamoSoft CommView NCF- TamoSoft CommView NCFXdct2000 - Catapult DCT2000 trace (.out format)erf - Endace ERF captureeyesdn - EyeSDN USB S0/E1 ISDN trace formatk12text - K12 text filelanalyzer - Novell LANalyzerlogcat - Android Logcat Binary format- Android Logcat Brief text format- Android Logcat Long text format- Android Logcat Process text format- Android Logcat Tag text format- Android Logcat Thread text format- Android Logcat Threadtime text format- Android Logcat Time text formatmodpcap - Modified tcpdump - pcapnetmon1 - Microsoft NetMon 1.xnetmon2 - Microsoft NetMon 2.xnettl - HP-UX nettl tracengsniffer - Sniffer (DOS)ngwsniffer_1_1 - NetXray, Sniffer (Windows) 1.1ngwsniffer_2_0 - Sniffer (Windows) 2.00xnokiapcap - Nokia tcpdump - pcapnsecpcap - Wireshark/tcpdump/... - nanosecond pcapnstrace10 - NetScaler Trace (Version 1.0)nstrace20 - NetScaler Trace (Version 2.0)nstrace30 - NetScaler Trace (Version 3.0)nstrace35 - NetScaler Trace (Version 3.5)observer - Viavi Observerrf5 - Tektronix K12xx 32-bit .rf5 formatrh6_1pcap - RedHat 6.1 tcpdump - pcapsnoop - Sun snoopsuse6_3pcap - SuSE 6.3 tcpdump - pcapvisual - Visual Networks traffic captureeditcap -F pcap设置输出捕获文件的文件格式。缺省为pcapng格式。editcap -Teditcap: The available encapsulation types for the "-T" flag are:ap1394 - Apple IP-over-IEEE 1394arcnet - ARCNETarcnet_linux - Linux ARCNETascend - Lucent/Ascend access equipment- ATM PDUs- ATM PDUs - untruncated- RFC 1483 ATMax25 - Amateur Radio AX.25- AX.25 with KISS header- BACnet MS/TP- BACnet MS/TP with Directional Infober - ASN.1 Basic Encoding Rules- Bluetooth BR/EDR Baseband RF- Bluetooth H4- Bluetooth H4 with linux header- Bluetooth without transport layer- Bluetooth Low Energy Link Layer- Bluetooth Low Energy Link Layer RF- Bluetooth Linux Monitorcan20b - Controller Area Network 2.0Bchdlc - Cisco HDLC- Cisco HDLC with Directional Infocosine - CoSine L2 debug logdbus - D-Busdct2000 - Catapult DCT2000docsis - Data Over Cable Service Interface Specificationdocsis31_xra31 - DOCSIS with Excentis XRA pseudo-headerdpauxmon - DisplayPort AUX channel with Unigraf pseudo-headerdpnss_link - Digital Private Signalling System No 1 Link Layerdvbci - DVB-CI (Common Interface)ebhscr - Elektrobit High Speed Capture and Replayenc - OpenBSD enc(4) encapsulating interfaceepon - Ethernet Passive Optical Networkerf - Extensible Record Formateri_enb_log - Ericsson eNode-B raw logether - Ethernet- IEEE 802.3br mPackets- Ethernet with nettl headersetw - Event Tracing for Windows messagesfc2 - Fibre Channel FC-2fc2sof - Fibre Channel FC-2 With Frame Delimiterfddi - FDDI- FDDI with nettl headers- FDDI with bit-swapped MAC addressesflexray - FlexRayfrelay - Frame Relay- Frame Relay with Directional Info- GCOM Serial- GCOM TIE1- ITU-T G.7041/Y.1303 Generic Framing Procedure Frame-mapped mode- ITU-T G.7041/Y.1303 Generic Framing Procedure Transparent mode- GPRS LLCgsm_um - GSM Um Interfacehhdlc - HiPath HDLC- I2C with Linux-specific pseudo-header- IEEE 802.11 Wireless LAN- IEEE 802.11 plus AVS radio header- IEEE 802.11 plus Network Monitor radio header- IEEE 802.11 plus Prism II monitor mode radio header- IEEE 802.11 Wireless LAN with radio information- IEEE 802.11 plus radiotap radio header- IEEE 802.16 MAC Common Part Sublayerinfiniband - InfiniBandios - Cisco IOS internal- IP over IB- RFC 2625 IP-over-Fibre Channel- IP over InfiniBandipfix - RFC 5655/RFC 5101 IPFIX- Intelligent Platform Management Bus with Kontron pseudo-header- IPMI Trace Data Collectionipnet - Solaris IPNETirda - IrDAisdn - ISDNiso14443 - ISO 14443 contactless smartcard standardsixveriwave - IxVeriWave header and stats blockjfif - JPEG/JFIFjson - JavaScript Object Notation- Juniper ATM1- Juniper ATM2- Juniper C-HDLC- Juniper Ethernet- Juniper Frame-Relay- Juniper GGSN- Juniper MLFR- Juniper MLPPP- Juniper PPP- Juniper PPPoE- Juniper Secure Tunnel Information- Juniper Services- Juniper VN- Juniper Voice PICk12 - K12 protocol analyzerlapb - LAPBlapd - LAPD- EyeSDN Layer 1 eventlin - Local Interconnect Network- Linux ATM CLIP- LAPD with Linux pseudo-header- Linux cooked-mode capture v1- Linux cooked-mode capture v2log_3GPP - 3GPP Phone Loglogcat - Android Logcat Binary formatlogcat_brief - Android Logcat Brief text formatlogcat_long - Android Logcat Long text formatlogcat_process - Android Logcat Process text formatlogcat_tag - Android Logcat Tag text formatlogcat_thread - Android Logcat Thread text formatlogcat_threadtime - Android Logcat Threadtime text formatlogcat_time - Android Logcat Time text formatloop - OpenBSD loopbackloratap - LoRaTapltalk - Localtalkmessage_analyzer_wfp_capture2_v4 - Message Analyzer WFP Capture2 v4message_analyzer_wfp_capture2_v6 - Message Analyzer WFP Capture2 v6message_analyzer_wfp_capture_auth_v4 - Message Analyzer WFP Capture Auth v4message_analyzer_wfp_capture_auth_v6 - Message Analyzer WFP Capture Auth v6message_analyzer_wfp_capture_v4 - Message Analyzer WFP Capture v4message_analyzer_wfp_capture_v6 - Message Analyzer WFP Capture v6mime - MIMEmost - Media Oriented Systems Transportmp2ts - ISO/IEC 13818-1 MPEG2-TSmp4 - MP4 filesmpeg - MPEGmtp2 - SS7 MTP2- MTP2 with pseudoheadermtp3 - SS7 MTP3mux27010 - MUX27010netanalyzer - Hilscher netANALYZER- Hilscher netANALYZER-Transparentnetlink - Linux Netlinknetmon_event - Network Monitor Network Eventnetmon_filter - Network Monitor Filternetmon_header - Network Monitor Headernetmon_network_info - Network Monitor Network Info- NFC LLCPnflog - NFLOGnordic_ble - nRF Sniffer for Bluetooth LEnstrace10 - NetScaler Encapsulation 1.0 of Ethernetnstrace20 - NetScaler Encapsulation 2.0 of Ethernetnstrace30 - NetScaler Encapsulation 3.0 of Ethernetnstrace35 - NetScaler Encapsulation 3.5 of Ethernetnull - NULL/Loopbackpacketlogger - Apple Bluetooth PacketLoggerpflog - OpenBSD PF Firewall logs- OpenBSD PF Firewall logs, pre-3.4pktap - Apple PKTAPppi - Per-Packet Information headerppp - PPP- PPP with Directional Infopppoes - PPP-over-Ethernet session- Raw ICMP with nettl headers- Raw ICMPv6 with nettl headers- Raw telnet with nettl headersrawip - Raw IP- Raw IP with nettl headersrawip4 - Raw IPv4rawip6 - Raw IPv6redback - Redback SmartEdgerfc7468 - RFC 7468 file- RTAC serial-lineruby_marshal - Ruby marshal objects4607 - STANAG 4607- STANAG 5066 Data Transfer Sublayer PDUs(D_PDU)sccp - SS7 SCCPsctp - SCTPsdh - SDHsdjournal - systemd journalsdlc - SDLC- SITA WAN packetsslip - SLIPsocketcan - SocketCANsymantec - Symantec Enterprise Firewalltnef - Transport-Neutral Encapsulation Formattr - Token Ring- Token Ring with nettl headerstzsp - Tazmen sniffer protocolunknown - Unknown- Unknown link-layer type with nettl headers- USB 2.0/1.1/1.0 packets- USB packets with Darwin (macOS, etc.) headers- USB packets with FreeBSD header- USB packets with Linux header- USB packets with Linux header and padding- USB packets with USBPcap headeruser0 - USER 0user1 - USER 1user2 - USER 2user3 - USER 3user4 - USER 4user5 - USER 5user6 - USER 6user7 - USER 7user8 - USER 8user9 - USER 9user10 - USER 10user11 - USER 11user12 - USER 12user13 - USER 13user14 - USER 14user15 - USER 15- V5 Envelope Functionvpp - Vector Packet Processing graph dispatch tracevsock - Linux vsockwhdlc - Wellfleet HDLC- Wireshark Upper PDU exportwpan - IEEE 802.15.4 Wireless PAN- IEEE 802.15.4 Wireless PAN with FCS not present- IEEE 802.15.4 Wireless PAN non-ASK PHY- IEEE 802.15.4 Wireless with TAP pseudo-header- X2E serial line capture- X2E Xoraya- X.25 with nettl headersxeth - Xerox 3MB Ethernet- Z-Wave Serial API packetseditcap -T linux-sll-T 用于指定封装类型,输出捕获文件的封装类型将被强制为指定类型。默认类型适合于输入捕获文件的封装类型。editcap --inject-secrets <secrets type>,<file>editcap --inject-secrets helptlswgeditcap --inject-secrets tls,tls.log test.pcapng test1.pcapngDecryption Secrets Block (DSB),输出test1.pcapngeditcap --discard-all-secrets test1.pcapng test.pcapng当写入输出文件时,丢弃输入文件中的所有解密密钥。editcap --capture-comment "test test" test.pcapng test1.pcapng目前只显示捕获文件的第一个注释。editcap --discard-capture-comment test1.pcapng test.pcapng丢弃来自输入文件的所有捕获文件注释。
Miscellaneous
杂项选项,主要包括以下:
Miscellaneous:display this help and exit.verbose output.If -v is used with any of the 'Duplicate Packetoptions (-d, -D or -w) then Packet lengthsand MD5 hashes are printed to standard-error.--version print version information and exit.editcap -hEditcap (Wireshark) 3.6.0 (v3.6.0-0-g3a34e44d02c9)Edit and/or translate the format of capture files.See https://www.wireshark.org for more information.Usage: editcap [options] ... <infile> <outfile> [ <packet#>[-<packet#>] ... ]and <outfile> must both be present.A single packet or a range of packets can be selected.Packet selection:keep the selected packets; default is to delete them.<start time> only read packets whose timestamp is after (or equalthe given time.<stop time> only read packets whose timestamp is before thegiven time.Time format for -A/-B options is:mm:ss[.nnnnnnnnn][Z|+-hh:mm]Unix epoch timestamps are also supported.Duplicate packet removal:remove vlan info from packets before checking for duplicates.remove packet if duplicate (window == 5).<dup window> remove packet if duplicate; configurable <dup window>.Valid <dup window> values are 0 to 1000000.NOTE: A <dup window> of 0 with -v (verbose option) isuseful to print MD5 hashes.<dup time window> remove packet if duplicate packet is found EQUAL TO ORLESS THAN <dup time window> prior to current packet.A <dup time window> is specified in relative seconds0.000001).NOTE: The use of the 'Duplicate packet removal' options withother editcap options except -v may not always work as expected.Specifically the -r, -t or -S options will very likely NOT have thedesired effect if combined with the -d, -D or -w.skip radiotap header when checking for packet duplicates.Useful when processing packets captured by multiple radioson the same channel in the vicinity of each other.Packet manipulation:<snaplen> truncate each packet to max. <snaplen> bytes of data.[offset:]<choplen> chop each packet by <choplen> bytes. Positive valueschop at the packet beginning, negative values at thepacket end. If an optional offset precedes the length,then the bytes chopped will be offset from that value.Positive offsets are from the packet beginning,negative offsets are from the packet end. You can usethis option more than once, allowing up to 2 choppingregions within a packet provided that at least 1choplen is positive and at least 1 is negative.adjust the frame (i.e. reported) length when choppingsnapping.<time adjustment> adjust the timestamp of each packet.adjustment> is in relative seconds (e.g. -0.5).<strict adjustment> adjust timestamp of packets if necessary to ensurestrict chronological increasing order. The <strictis specified in relative seconds withvalues of 0 or 0.000001 being the most reasonable.A negative adjustment value will modify timestamps sothat each packet's delta time is the absolute valueof the adjustment specified. A value of -0 will setall packets to the timestamp of the first packet.<error probability> set the probability (between 0.0 and 1.0 incl.) thata particular packet byte will be randomly changed.<change offset> When used in conjunction with -E, skip some bytes from thebeginning of the packet. This allows one to preserve somein order to have some headers untouched.<seed> When used in conjunction with -E, set the seed to use forthe pseudo-random number generator. This allows one torepeat a particular sequence of errors.<bytes to ignore> ignore the specified number of bytes at the beginningof the frame during MD5 hash calculation, unless theframe is too short, then the full frame is used.Useful to remove duplicated packets taken onseveral routers (different mac addresses forexample).-I 26 in case of Ether/IP will ignoreand IP header(20 - 4(src ip) - 4(dst ip)).<framenum>:<comment> Add or replace comment for given frame numberOutput File(s):<packets per file> split the packet output to different files based onuniform packet counts with a maximum ofper file> each.<seconds per file> split the packet output to different files based onuniform time intervals with a maximum ofper file> each.<capture type> set the output file type; default is pcapng.An empty "-F" option will list the file types.<encap type> set the output file encapsulation type; default is thesame as the input file. An empty "-T" option willlist the encapsulation types.<type>,<file> Insert decryption secrets from <file>. Listsupported secret types with "--inject-secrets help".Discard all decryption secrets from the input filewhen writing the output file. Does not discardsecrets added by "--inject-secrets" in the samecommand line.<comment>Add a capture file comment, if supported.--discard-capture-commentDiscard capture file comments from the input filewhen writing the output file. Does not discardcomments added by "--capture-comment" in the samecommand line.Miscellaneous:display this help and exit.verbose output.If -v is used with any of the 'Duplicate Packetoptions (-d, -D or -w) then Packet lengthsand MD5 hashes are printed to standard-error.--version print version information and exit.editcap -rv test.pcapng test1.pcapng 1File test.pcapng is a InfoVista 5View capture capture file.Add_Selected: 1Not inclusive ... 1Packet: 1editcap -dv test.pcapng test1.pcapngFile test.pcapng is a InfoVista 5View capture capture file.Packet: 1, Len: 112, MD5 Hash: d60cdd08f3de236cf7a2dc35cb7d6de7Packet: 2, Len: 112, MD5 Hash: 8115aa6990b2064660934f36f1b5baccPacket: 3, Len: 112, MD5 Hash: 1fbf43ee3fb682cb82d5adddf87bb0ccPacket: 4, Len: 112, MD5 Hash: 129fcc09853b16a260b55b92656fb148Packet: 5, Len: 112, MD5 Hash: 4f2a15c3946ab86b6fccf70ad84d57a9Packet: 6, Len: 112, MD5 Hash: d60cdd08f3de236cf7a2dc35cb7d6de76 packets seen, 0 packets skipped with duplicate window of 5 packets.editcap -VEditcap (Wireshark) 3.6.0 (v3.6.0-0-g3a34e44d02c9)Copyright 1998-2021 Gerald Combs <[email protected]> and contributors.License GPLv2+: GNU GPL version 2 or later <https://www.gnu.org/licenses/gpl-2.0.html>This is free software; see the source for copying conditions. There is NOnot even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.Compiled (64-bit) using Microsoft Visual Studio 2019 (VC++ 14.29, build 30040),with GLib 2.66.4, with zlib 1.2.11.Running on 64-bit Windows 10 (1809), build 17763, with Intel(R) Xeon(R) Gold6226R CPU @ 2.90GHz (with SSE4.2), with 16382 MB of physical memory, with GLibwith LC_TYPE=C, binary plugins supported (0 loaded).
往期推荐
推荐站内搜索:最好用的开发软件、免费开源系统、渗透测试工具云盘下载、最新渗透测试资料、最新黑客工具下载……




还没有评论,来说两句吧...