A full development environment for network packet capture, analysis and transmission in Java.
jNetPcap SDK is comprised of several java modules, each hosted on Github, that provides APIs for packet capture and transmission using the native libpcap library and its mechanism on many different platforms, see jNetPcap Wrapper. Once a packet is captured, each packet is further processed using jNetPcap API by going through a series of transnformers called packet processors.
The list of packet processors is extensive and more will be added in the future. Here is a short list of few top ones:
PacketDissector
- dissects raw packets and generates protocol information for use with protocol packs.PacketPlayer
- Facilitates the playback of offline captures, allowing users to replay captured packets from a file at their original Inter-Frame Gap (IFG) or at a user-defined speed based on the embedded timestamps within each packet. This enables analysis and testing scenarios with precise control over the timing and pacing of network traffic.DataObfuscator
- 4. DataObfuscator: Safeguards user privacy by employing obfuscation techniques to mask sensitive information within captured packets.To get started lets take a look at a couple of examples.
Capturing and transmitting packets is straight forward and easy out of the box.
Note! jNetPcap also provides many useful utilities to help in working with the data received, such as byte arrays to hex string, and hex string to byte array, and much more. More advanced utility packet handlers such as no-copy on capture, are provides as well and discussed in the Wiki pages.
This quick example[^1] demonstrates how to read packets from a file and print each packet contents (with all possible detail) to the console.
try (var pcap = NetPcap.openOffline("pcaps/IPv4-ipf.pcapng")) {
pcap.dispatch(System.out::println);
}
View raw at Example6 link
Which produces the following output:
Frame: Frame #1, 192.168.1.225 > 142.250.81.238 proto=ICMPv4 len=1514 bytes info=ICMPv4
Frame: Interface id = 0 (pcaps/IPv4-ipf.pcapng)
Frame: Frame Number = 1
Frame: Arrival Time = 2023-04-19 23:01:47.079983000 [0x6440AB1B0001386F]
Frame: Capture Length = 1514 bytes (12112 bits)
Frame: Frame Length = 1514 bytes (12112 bits)
Frame:
Ethernet: + Ethernet II, src: ASUSTekC_34:47:63 dst: Verizon_f9:6f:a0 offset=0 length=14
Ethernet: Destination Address = Verizon_f9:6f:a0 (20:C0:47:F9:6F:A0)
Ethernet: Source Address = ASUSTekC_34:47:63 (54:04:A6:34:47:63)
Ethernet: Type = IPv4 (0x0800)
Ethernet:
IPv4: + Internet Protocol Version 4, offset=14, length=20
IPv4: Version = 4
IPv4: 0100 .... = Version: 4
IPv4: Header Length = 5 [5*4 = 20 bytes]
IPv4: .... 0101 = Header Length: 20 bytes (5)
IPv4: Traffic class = 0x00 [DSCP: CS0, ECN: Not-ECT]
IPv4: 0000 00.. = Differentiated Services Codepoint: Default (0)
IPv4: .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
IPv4: Total Length = 1500 bytes
IPv4: Identification = 0x7EF2 (32498)
IPv4: Flags = 0x1 [MF]
IPv4: 001. .... .... .... = Flags: 0x1 (••M)
IPv4: Fragment Offset = 0 [0*8 = 0 bytes]]
IPv4: ...0 0000 0000 0000 = Fragment Offset: 0
IPv4: Time to Live = 64
IPv4: Protocol = ICMPv4 (1)
IPv4: Header Checkusm = 0x32bd
IPv4: Source Address = 192.168.1.225
IPv4: Destination Address = 142.250.81.238
IPv4:
ICMPv4: + Internet Control Message Protocol Echo (Ping), offset=34, length=8
ICMPv4: Identifier = 26 (0x001A)
ICMPv4: Sequence Number = 5
ICMPv4:
...
Note! output trucated after the first packet for brevity
<dependency>
<groupId>com.slytechs.jnet.jnetpcap</groupId>
<artifactId>jnetpcap-sdk</artifactId>
<version>0.10.0</version>
</dependency>
sales@slytechs.com
for commercial and licensing questionsThere are API and license changes between version 1 and 2 of jNetPcap. Please see wiki home page for details.
So everyone is on the same page, we follow the following branching model.
Note 'main' branch replaces old 'master' branch references in document as per Github recommendation.