#up #packet #capture #protocols #analyzer #dev #gui

app cnote

cli packet capture program, ramping up for gui

1 unstable release

0.1.0 Sep 16, 2023

#83 in #analyzer

MIT license

2KB

cnote

rust protocol analyzer (early dev)

How it works

if not Open Suse (or maybe other linux variations)

first make sure rust is installed then clone the project then in the root of the project cargo run and the basic window should show up.

if OpenSuse (or maybe other linux variations)

cargo build --release \
&& sudo setcap cap_net_raw,cap_net_admin+eip target/release/cnote

if in Pop!_Os (in the cnote directory)

cargo build --release
sudo ./target/release/cnote

If you are linux, you may have to install the following dependencies:

dbus-x11
libgtk-3-dev

Supported protocols

Ethernet, IPv4, UDP, and TCP right now

base frame

#[derive(Default, Debug)]
pub struct EthernetFrame {
    pub id: i32,
    pub timestamp: String,
    pub header: EthernetHeader,
    pub payload: Option<Box<dyn Layer>>,
}

Layer is a trait object that gets implemented further down the line. Ever protocol it encapsulates implements the trait Layer
so
Ethernet -> IP -> TCP

Layers

Every packet implements the layer trait, layer implements the Send marker

Sniffers

Sniffers are the packet capture logic.

This is just a rough outline for anyone who reads this/myself so i know what im doing.

Each packet that implements layer handles the logic for the layer it encapsulates.

Milestones

  1. Establish a general framework for the backend that is a reasonable approach
    🔵🔵🔵🔵🔵⬜⬜⬜⬜⬜ 50%
  2. Logging -
    ⬜⬜⬜⬜⬜⬜⬜⬜⬜⬜ 0 %
  3. Set up basic gui -
    🔵🔵⬜⬜⬜⬜⬜⬜⬜⬜ 0 %
  4. Figure out how to handle 802.11 frame -
    ⬜⬜⬜⬜⬜⬜⬜⬜⬜⬜ 0%
  5. Figure out how to highlight problem packets -
    ⬜⬜⬜⬜⬜⬜⬜⬜⬜⬜ 0%

No runtime deps