sniffer 7.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271
  1. #------------------------------------------------------------------------------
  2. # $File: sniffer,v 1.19 2013/01/06 01:11:04 christos Exp $
  3. # sniffer: file(1) magic for packet capture files
  4. #
  5. # From: guy@alum.mit.edu (Guy Harris)
  6. #
  7. #
  8. # Microsoft Network Monitor 1.x capture files.
  9. #
  10. 0 string RTSS NetMon capture file
  11. >5 byte x - version %d
  12. >4 byte x \b.%d
  13. >6 leshort 0 (Unknown)
  14. >6 leshort 1 (Ethernet)
  15. >6 leshort 2 (Token Ring)
  16. >6 leshort 3 (FDDI)
  17. >6 leshort 4 (ATM)
  18. >6 leshort >4 (type %d)
  19. #
  20. # Microsoft Network Monitor 2.x capture files.
  21. #
  22. 0 string GMBU NetMon capture file
  23. >5 byte x - version %d
  24. >4 byte x \b.%d
  25. >6 leshort 0 (Unknown)
  26. >6 leshort 1 (Ethernet)
  27. >6 leshort 2 (Token Ring)
  28. >6 leshort 3 (FDDI)
  29. >6 leshort 4 (ATM)
  30. >6 leshort 5 (IP-over-IEEE 1394)
  31. >6 leshort 6 (802.11)
  32. >6 leshort 7 (Raw IP)
  33. >6 leshort 8 (Raw IP)
  34. >6 leshort 9 (Raw IP)
  35. >6 leshort >9 (type %d)
  36. #
  37. # Network General Sniffer capture files.
  38. # Sorry, make that "Network Associates Sniffer capture files."
  39. # Sorry, make that "Network General old DOS Sniffer capture files."
  40. #
  41. 0 string TRSNIFF\ data\ \ \ \ \032 Sniffer capture file
  42. >33 byte 2 (compressed)
  43. >23 leshort x - version %d
  44. >25 leshort x \b.%d
  45. >32 byte 0 (Token Ring)
  46. >32 byte 1 (Ethernet)
  47. >32 byte 2 (ARCNET)
  48. >32 byte 3 (StarLAN)
  49. >32 byte 4 (PC Network broadband)
  50. >32 byte 5 (LocalTalk)
  51. >32 byte 6 (Znet)
  52. >32 byte 7 (Internetwork Analyzer)
  53. >32 byte 9 (FDDI)
  54. >32 byte 10 (ATM)
  55. #
  56. # Cinco Networks NetXRay capture files.
  57. # Sorry, make that "Network General Sniffer Basic capture files."
  58. # Sorry, make that "Network Associates Sniffer Basic capture files."
  59. # Sorry, make that "Network Associates Sniffer Basic, and Windows
  60. # Sniffer Pro", capture files."
  61. # Sorry, make that "Network General Sniffer capture files."
  62. # Sorry, make that "NetScout Sniffer capture files."
  63. #
  64. 0 string XCP\0 NetXRay capture file
  65. >4 string >\0 - version %s
  66. >44 leshort 0 (Ethernet)
  67. >44 leshort 1 (Token Ring)
  68. >44 leshort 2 (FDDI)
  69. >44 leshort 3 (WAN)
  70. >44 leshort 8 (ATM)
  71. >44 leshort 9 (802.11)
  72. #
  73. # "libpcap" capture files.
  74. # (We call them "tcpdump capture file(s)" for now, as "tcpdump" is
  75. # the main program that uses that format, but there are other programs
  76. # that use "libpcap", or that use the same capture file format.)
  77. #
  78. 0 name pcap-be
  79. >4 beshort x - version %d
  80. >6 beshort x \b.%d
  81. >20 belong 0 (No link-layer encapsulation
  82. >20 belong 1 (Ethernet
  83. >20 belong 2 (3Mb Ethernet
  84. >20 belong 3 (AX.25
  85. >20 belong 4 (ProNET
  86. >20 belong 5 (CHAOS
  87. >20 belong 6 (Token Ring
  88. >20 belong 7 (BSD ARCNET
  89. >20 belong 8 (SLIP
  90. >20 belong 9 (PPP
  91. >20 belong 10 (FDDI
  92. >20 belong 11 (RFC 1483 ATM
  93. >20 belong 12 (raw IP
  94. >20 belong 13 (BSD/OS SLIP
  95. >20 belong 14 (BSD/OS PPP
  96. >20 belong 19 (Linux ATM Classical IP
  97. >20 belong 50 (PPP or Cisco HDLC
  98. >20 belong 51 (PPP-over-Ethernet
  99. >20 belong 99 (Symantec Enterprise Firewall
  100. >20 belong 100 (RFC 1483 ATM
  101. >20 belong 101 (raw IP
  102. >20 belong 102 (BSD/OS SLIP
  103. >20 belong 103 (BSD/OS PPP
  104. >20 belong 104 (BSD/OS Cisco HDLC
  105. >20 belong 105 (802.11
  106. >20 belong 106 (Linux Classical IP over ATM
  107. >20 belong 107 (Frame Relay
  108. >20 belong 108 (OpenBSD loopback
  109. >20 belong 109 (OpenBSD IPsec encrypted
  110. >20 belong 112 (Cisco HDLC
  111. >20 belong 113 (Linux "cooked"
  112. >20 belong 114 (LocalTalk
  113. >20 belong 117 (OpenBSD PFLOG
  114. >20 belong 119 (802.11 with Prism header
  115. >20 belong 122 (RFC 2625 IP over Fibre Channel
  116. >20 belong 123 (SunATM
  117. >20 belong 127 (802.11 with radiotap header
  118. >20 belong 129 (Linux ARCNET
  119. >20 belong 138 (Apple IP over IEEE 1394
  120. >20 belong 139 (MTP2 with pseudo-header
  121. >20 belong 140 (MTP2
  122. >20 belong 141 (MTP3
  123. >20 belong 142 (SCCP
  124. >20 belong 143 (DOCSIS
  125. >20 belong 144 (IrDA
  126. >20 belong 147 (Private use 0
  127. >20 belong 148 (Private use 1
  128. >20 belong 149 (Private use 2
  129. >20 belong 150 (Private use 3
  130. >20 belong 151 (Private use 4
  131. >20 belong 152 (Private use 5
  132. >20 belong 153 (Private use 6
  133. >20 belong 154 (Private use 7
  134. >20 belong 155 (Private use 8
  135. >20 belong 156 (Private use 9
  136. >20 belong 157 (Private use 10
  137. >20 belong 158 (Private use 11
  138. >20 belong 159 (Private use 12
  139. >20 belong 160 (Private use 13
  140. >20 belong 161 (Private use 14
  141. >20 belong 162 (Private use 15
  142. >20 belong 163 (802.11 with AVS header
  143. >20 belong 165 (BACnet MS/TP
  144. >20 belong 166 (PPPD
  145. >20 belong 169 (GPRS LLC
  146. >20 belong 177 (Linux LAPD
  147. >20 belong 187 (Bluetooth HCI H4
  148. >20 belong 189 (Linux USB
  149. >20 belong 192 (PPI
  150. >20 belong 195 (802.15.4
  151. >20 belong 196 (SITA
  152. >20 belong 197 (Endace ERF
  153. >20 belong 201 (Bluetooth HCI H4 with pseudo-header
  154. >20 belong 202 (AX.25 with KISS header
  155. >20 belong 203 (LAPD
  156. >20 belong 204 (PPP with direction pseudo-header
  157. >20 belong 205 (Cisco HDLC with direction pseudo-header
  158. >20 belong 206 (Frame Relay with direction pseudo-header
  159. >20 belong 209 (Linux IPMB
  160. >20 belong 215 (802.15.4 with non-ASK PHY header
  161. >20 belong 220 (Memory-mapped Linux USB
  162. >20 belong 224 (Fibre Channel FC-2
  163. >20 belong 225 (Fibre Channel FC-2 with frame delimiters
  164. >20 belong 226 (Solaris IPNET
  165. >20 belong 227 (SocketCAN
  166. >20 belong 228 (Raw IPv4
  167. >20 belong 229 (Raw IPv6
  168. >20 belong 230 (802.15.4 without FCS
  169. >20 belong 231 (D-Bus messages
  170. >20 belong 235 (DVB-CI
  171. >20 belong 236 (MUX27010
  172. >20 belong 237 (STANAG 5066 D_PDUs
  173. >20 belong 239 (Linux netlink NFLOG messages
  174. >20 belong 240 (Hilscher netAnalyzer
  175. >20 belong 241 (Hilscher netAnalyzer with delimiters
  176. >20 belong 242 (IP-over-Infiniband
  177. >20 belong 243 (MPEG-2 Transport Stream packets
  178. >20 belong 244 (ng4t ng40
  179. >20 belong 245 (NFC LLCP
  180. >20 belong 247 (Infiniband
  181. >20 belong 248 (SCTP
  182. >16 belong x \b, capture length %d)
  183. 0 ubelong 0xa1b2c3d4 tcpdump capture file (big-endian)
  184. !:mime application/vnd.tcpdump.pcap
  185. >0 use pcap-be
  186. 0 ulelong 0xa1b2c3d4 tcpdump capture file (little-endian)
  187. !:mime application/vnd.tcpdump.pcap
  188. >0 use \^pcap-be
  189. #
  190. # "libpcap"-with-Alexey-Kuznetsov's-patches capture files.
  191. # (We call them "tcpdump capture file(s)" for now, as "tcpdump" is
  192. # the main program that uses that format, but there are other programs
  193. # that use "libpcap", or that use the same capture file format.)
  194. #
  195. 0 ubelong 0xa1b2cd34 extended tcpdump capture file (big-endian)
  196. >0 use pcap-be
  197. 0 ulelong 0xa1b2cd34 extended tcpdump capture file (little-endian)
  198. >0 use \^pcap-be
  199. #
  200. # "pcap-ng" capture files.
  201. # http://www.winpcap.org/ntar/draft/PCAP-DumpFileFormat.html
  202. # Pcap-ng files can contain multiple sections. Printing the endianness,
  203. # snaplen, or other information from the first SHB may be misleading.
  204. #
  205. 0 ubelong 0x0a0d0d0a
  206. >8 ubelong 0x1a2b3c4d pcap-ng capture file
  207. >>12 beshort x - version %d
  208. >>14 beshort x \b.%d
  209. 0 ulelong 0x0a0d0d0a
  210. >8 ulelong 0x1a2b3c4d pcap-ng capture file
  211. >>12 leshort x - version %d
  212. >>14 leshort x \b.%d
  213. #
  214. # AIX "iptrace" capture files.
  215. #
  216. 0 string iptrace\ 1.0 "iptrace" capture file
  217. 0 string iptrace\ 2.0 "iptrace" capture file
  218. #
  219. # Novell LANalyzer capture files.
  220. #
  221. 0 leshort 0x1001 LANalyzer capture file
  222. 0 leshort 0x1007 LANalyzer capture file
  223. #
  224. # HP-UX "nettl" capture files.
  225. #
  226. 0 string \x54\x52\x00\x64\x00 "nettl" capture file
  227. #
  228. # RADCOM WAN/LAN Analyzer capture files.
  229. #
  230. 0 string \x42\xd2\x00\x34\x12\x66\x22\x88 RADCOM WAN/LAN Analyzer capture file
  231. #
  232. # NetStumbler log files. Not really packets, per se, but about as
  233. # close as you can get. These are log files from NetStumbler, a
  234. # Windows program, that scans for 802.11b networks.
  235. #
  236. 0 string NetS NetStumbler log file
  237. >8 lelong x \b, %d stations found
  238. #
  239. # *Peek tagged capture files.
  240. #
  241. 0 string \177ver EtherPeek/AiroPeek/OmniPeek capture file
  242. #
  243. # Visual Networks traffic capture files.
  244. #
  245. 0 string \x05VNF Visual Networks traffic capture file
  246. #
  247. # Network Instruments Observer capture files.
  248. #
  249. 0 string ObserverPktBuffe Network Instruments Observer capture file
  250. #
  251. # Files from Accellent Group's 5View products.
  252. #
  253. 0 string \xaa\xaa\xaa\xaa 5View capture file