我在我们的Ubuntu服务器上捕获了一些带有pcapplusplus的包,并写入了.pcap文件,然后我读取了.pcap文件,它工作得很好;但是当我用BPF语法设置过滤器时,它不能从.pcap文件中读取,过滤器只是一个tcp字符串,它在示例input.pcap中工作得很好,但是不能处理我的pcap,
pcpp::IFileReaderDevice* reader = pcpp::IFileReaderDevice::getReader("input.pcap");
// verify that a reader interface was indeed created
if (reader == NULL)
{
printf("Cannot determine reader for file type\n");
exit(1);
}
// open the reader for reading
if (!reader->open())
{
printf("Cannot open input.pcap for reading\n");
exit(1);
}
// create a pcap file writer. Specify file name and link type of all packets that
// will be written to it
pcpp::PcapFileWriterDevice pcapWriter("output.pcap", pcpp::LINKTYPE_ETHERNET);
// try to open the file for writing
if (!pcapWriter.open())
{
printf("Cannot open output.pcap for writing\n");
exit(1);
}
// create a pcap-ng file writer. Specify file name. Link type is not necessary because
// pcap-ng files can store multiple link types in the same file
pcpp::PcapNgFileWriterDevice pcapNgWriter("output.pcapng");
// try to open the file for writing
if (!pcapNgWriter.open())
{
printf("Cannot open output.pcapng for writing\n");
exit(1);
}
// set a BPF filter for the reader - only packets that match the filter will be read
if (!reader->setFilter("tcp"))
{
printf("Cannot set filter for file reader\n");
exit(1);
}
// the packet container
pcpp::RawPacket rawPacket;
// a while loop that will continue as long as there are packets in the input file
// matching the BPF filter
while (reader->getNextPacket(rawPacket))
{
// write each packet to both writers
printf("matched ...\n");
pcapWriter.writePacket(rawPacket);
pcapNgWriter.writePacket(rawPacket);
}下面是一些数据包:在这里输入图像描述
1:https://i.stack.imgur.com/phYA0.png,有人能帮忙吗?
发布于 2022-02-25 08:21:51
TL;DR..您需要使用过滤器vlan and tcp来捕获带有VLAN标记的vlan and tcp数据包。
解释
我们可以查看仅使用tcp时生成的BPF过滤器。
$ tcpdump -d -i eth0 tcp
(000) ldh [12]
(001) jeq #0x86dd jt 2 jf 7
(002) ldb [20]
(003) jeq #0x6 jt 10 jf 4
(004) jeq #0x2c jt 5 jf 11
(005) ldb [54]
(006) jeq #0x6 jt 10 jf 11
(007) jeq #0x800 jt 8 jf 11
(008) ldb [23]
(009) jeq #0x6 jt 10 jf 11
(010) ret #262144
(011) ret #0我们可以看到两个字节首先从数据包中的偏移量12加载。它对应于以太网报头中的以太类型。然后,它用于检查我们是解析IPv6 (jeq #0x86dd)还是IPv4 (jeq #0x800)数据包。
但是,当有VLAN标记时,Ethertype字段被移动4个字节( VLAN标记字段的长度)。因此,对于带有VLAN标记的数据包,我们应该在偏移量16处读取Ethertype。
使用filter vlan and tcp实现此更改,首先检查是否存在VLAN标记,然后在读取Ethertype时将其考虑在内。因此,要过滤TCP数据包,不管它们是否有VLAN标记,您都需要tcp or (vlan and tcp)。
发布于 2022-02-24 22:18:30
@pchaigno是正确的;您需要执行vlan and tcp,或者,要同时捕获VLAN封装和非VLAN封装的TCP数据包,则需要tcp or (vlan and tcp)。
https://stackoverflow.com/questions/71248686
复制相似问题