A simple package for packet sniffing, with static/dynamic filtering options, real-time reaction, I/O operations and more.
Project description
Sniffing IO
A simple package for packet sniffing, with static/dynamic filtering options, real-time reaction, I/O operations and more.
The sniffing mechanism of sniffing-io is primarily based on the Scapy sniff function, but extends functionality and ease of control.
Installation
pip install sniffing-io
example
from sniffingio import pfv, Sniffer, SniffSettings, write_pcap
ip_filter = pfv(names=['host'], values=['192.168.0.124', '192.168.0.45'])
tcp_filter = pfv(names=['port'], values=[6000])
static_filter = ip_filter & ~tcp_filter
print(static_filter.format())
data = SniffSettings(count=10, static_filter=static_filter)
sniffer = Sniffer(data)
sniffed = sniffer.start()
write_pcap(sniffed, "packets.pcap")
Sniffer interface:
from sniffingio import Sniffer, SniffSettings, PacketList
sniffer = Sniffer(SniffSettings(...))
sniffed1: PacketList = sniffer.start()
sniffer.thread_start()
sniffer.stop()
sniffed2: PacketList = sniffer.packets()
PacketFilter interface:
intersection:
from sniffingio import PacketFilterIntersection, pfv
pf1 = pfv(names=['host'], values=['192.168.0.124', '192.168.0.45'])
pf2 = pfv(names=['port'], values=[6000])
intersection1 = PacketFilterIntersection((pf1, pf2))
intersection2 = pf1 & pf2
print("same operation:", intersection1 == intersection2)
print("BPF:", intersection2.format())
output:
same operation: True
BPF: (((tcp or udp)) and ((src port 6000)))
union:
from sniffingio import PacketFilterUnion, pfv
pf1 = pfv(names=['host'], values=['192.168.0.124', '192.168.0.45'])
pf2 = pfv(names=['port'], values=[6000])
union1 = PacketFilterUnion((pf1, pf2))
union2 = pf1 | pf2
print("same operation:", union1 == union2)
print("BPF:", union2.format())
output:
same operation: True
BPF: (((tcp or udp)) or ((src port 6000)))
negation:
from sniffingio import PacketFilterNegation, pfv
pf = pfv(values=["tcp", "udp"])
negation1 = PacketFilterNegation(pf)
negation2 = ~pf
print("same operation:", negation1 == negation2)
print("BPF:", negation2.format())
output:
same operation: True
BPF: (not ((tcp or udp)))
simple PacketFilter I/O:
from sniffingio import pfv, load_filters
ip_filter = pfv(names=['host'], values=['192.168.0.124', '192.168.0.45'])
tcp_filter = pfv(names=['port'], values=[6000])
org_pf = ip_filter & ~tcp_filter
org_pf_dump = org_pf.dump()
loaded_pf = load_filters(org_pf_dump)
print(org_pf_dump)
print(loaded_pf.format())
print('equal objects:', org_pf == loaded_pf)
output:
{'filters': ({'types': None, 'names': ['host'], 'values': ['192.168.0.124', '192.168.0.45'], 'source_values': None, 'destination_values': None, 'attributes': None, 'type': 'values'}, {'filter': {'types': None, 'names': ['port'], 'values': [6000], 'source_values': None, 'destination_values': None, 'attributes': None, 'type': 'values'}, 'type': 'negation'}), 'type': 'intersection'}
(((host 192.168.0.124) or (host 192.168.0.45)) and (not (port 6000)))
equal objects: True
SniffSettings options:
count: int = 0
timeout: int = None
store: bool = True
quiet: bool = True
callback: PacketCallback = None
printer: bool | PacketCallback = None
live_filter: LivePacketFilter = None
stop_filter: LivePacketFilter = None
interface: str | NetworkInterface = None
static_filter: str | BasePacketFilter = None
start_callback: Callable[[], ...] = None
PacketFilter options:
protocols: list[str] = None
source_hosts: list[str] = None
source_ports: list[int] = None
destination_hosts: list[str] = None
destination_ports: list[int] = None
Scapy Packet/PacketList I/O operations:
from sniffingio import PacketList, load_packet, dump_packet, write_pcap, read_pcap
org_p: PacketList = ...
org_p_dump: bytes = dump_packet(org_p)
loaded_p: PacketList = load_packet(org_p_dump)
print("equal data:", org_p_dump == dump_packet(loaded_p))
write_pcap(org_p, "packets.pcap")
read_p = read_pcap("packets.pcap")
print("equal data:", org_p_dump == dump_packet(read_p))
output:
equal data: True
equal data: True
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file sniffing_io-0.3.2.tar.gz.
File metadata
- Download URL: sniffing_io-0.3.2.tar.gz
- Upload date:
- Size: 11.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.0 CPython/3.12.0
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
ca73d0ad3ea4441ef1096c87fab88dc850a36437ee61dc87a819737f6ff9ad14
|
|
| MD5 |
575f56a8150161d16fc49c6091683f58
|
|
| BLAKE2b-256 |
90842039588dc6b6cb4042cc9468657ab1d6553800cc30114456ba80a3f88b11
|