3 # Split a tcpdump trace apart into multiple files, each containing a single TCP
6 import impacket, itertools, pcapy, re, socket, subprocess, sys
7 import impacket.ImpactDecoder, impacket.ImpactPacket
9 # Domain names for cloud service providers, whose traces we want to pull out.
10 DOMAINS = ['.amazon.com', '.amazonaws.com', '.core.windows.net',
11 '204.246.', '87.238.']
13 # The collection of flows we've seen. The value associated with each flow is a
14 # sequence number indicating in what order we saw the flows in the trace.
17 def ip_lookup(host, cache={}):
20 cache[host] = socket.gethostbyaddr(dst)[0]
25 # Step 1: Parse the input file and extract a listing of all the flows that we
27 def handler(header, data):
28 pkt = decoder.decode(data)
31 src = (ip.get_ip_src(), tcp.get_th_sport())
32 dst = (ip.get_ip_dst(), tcp.get_th_dport())
33 flow = tuple(sorted([src, dst],
34 cmp=lambda x, y: cmp(x[1], y[1]) or cmp(x[0], y[0])))
36 flows[flow] = max(itertools.chain(flows.values(), [0])) + 1
40 p = pcapy.open_offline(filename)
41 p.setfilter(r"ip proto \tcp")
42 assert p.datalink() == pcapy.DLT_EN10MB
43 decoder = impacket.ImpactDecoder.EthDecoder()
46 for file in sys.argv[1:]:
47 print "Scanning %s..." % (file,)
51 for (((dst, dport), (src, sport)), seq) in flows.items():
52 # Filter out to find just the relevant flows. Right now we want only
53 # flows to port 80 (since both S3/Azure use that as the service port
54 # when unencrypted which is what we use). We probably ought to apply
55 # another filter on IP address in case there happened to be any other
56 # HTTP flows during the trace capture.
57 if dport != 80: continue
61 if name.endswith(d): matches = True
62 if name.startswith(d): matches = True
64 print "Host", name, "not recognized, skipping"
67 filter = "tcp and (host %s and host %s) and (port %d and port %d)" \
68 % (src, dst, sport, dport)
69 filters[seq] = (filter, name)
72 for (_, (filter, name)) in sorted(filters.items()):
73 print "%d: %s" % (n, filter)
74 subprocess.check_call(['tcpdump', '-s0', '-r', file, '-w',
75 'trace-%03d-%s' % (n, name),