Perl script as a sniffer with built-in statistics
Baby Shark
If you need to browse through packets rushing by on the local network, Wireshark provides a useful service. But, if you prefer to build your own tools, why not use the command-line version, TShark, and a terminal-friendly Curses UI?
The easily installed and feature-rich analysis tool Wireshark reveals that calling a single news site on the Internet can cause more than 3,000 network packets to zoom back and forth between the browser and various servers, which can leave the respective user's fingerprints on a couple of dozen different websites.
Gullible Browsers
Have you ever wondered why each port of call on the Internet brings up the goodies you recently perused on Amazon, not to mention those pesky Facebook Like buttons? It seems that the original policy introduced by Netscape back in the dark ages of the Internet to ensure privacy despite cookies has been laid to waste by gatecrashers, such as DoubleClick.
You can now always assume that not only do the pages you surf know that you are back, but so do a dozen other curious sites that pay for the privilege. If you don't take drastic steps, the browser will gullibly broadcast your identity, including your surfing habits, all over the world.
The powerful GUI tool Wireshark (Figure 1) can help sniff out who's looking over your shoulder. This month, however, I'll take a different approach and present a Perl script that can be launched in a terminal window, just like the Top utility (Figure 2). This script shows a constantly updated list of identified targets of all network packets sniffed off the wire – sorted by frequency in which the addresses are resolved into DNS names.
One hurdle needs to be covered in advance: The Linux kernel only offers raw network packets to a process, if it is running with root privileges or has equivalent Unix capabilities. Running Wireshark with root privileges appeared too risky to its creators, so they offer wireshark-common
as an assisting package. This sets up a new Unix user named wireshark
and a Unix group with the same name.
Not as Root
If the admin on an Ubuntu or Debian system runs the following command:
sudo dpkg-reconfigure wireshark-common
the Postinst script spices up the capture script used by Wireshark /usr/bin/dumpcap
either with the Linux capabilities cap_net_raw
and cap_net_admin
(if available) or with a set-user-ID
bit, so that each member of the Wireshark Unix group is given access to raw network data. Other distributions add these settings from the outset when the package is installed. Users interested in the raw packets now only need to do this:
sudo usermod -a -G wireshark <Username>
to join the Wireshark group. And, after logging off and back on (yes, no kidding), they can then start collecting packets using the non-privileged account.
Command Line Instead of GUI
Wireshark's little command-line brother TShark, which Ubuntu installs with the command:
sudo apt-get install tshark
has similar capabilities for intercepting and filtering network packets and is therefore suitable for script-based data collection. Because the Ubuntu tshark
package also installs the wireshark-common
package for support, the above call to dkpg-reconfigure
gives TShark access to the raw network data.
A list of responsive network interfaces is output by calling tshark -d
; an Ethernet card will appear here, for example, as eth0
; a WiFi interface as en0
; and the loopback interface as a lo
. If you still can't decide and want to listen on all channels at the same time, you can also specify any
.
TShark now either stores the incoming data stream 1:1 in binary PCAP format or prefilters the input to save space. For example, using the command
tshark -i any -T fields -e ip.dst
only outputs the target addresses of packets passing through, although this still causes a significant flood of data on an active system.
The idea behind the script in Listing 1 [1] is to field these addresses and other data from the TShark output, accumulate the data, and display the results as an updated list with counters in a terminal running under Curses.
Listing 1
topaddr
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Thousands of Linux Servers Infected with Stealth Malware Since 2021
Perfctl is capable of remaining undetected, which makes it dangerous and hard to mitigate.
-
Halcyon Creates Anti-Ransomware Protection for Linux
As more Linux systems are targeted by ransomware, Halcyon is stepping up its protection.
-
Valve and Arch Linux Announce Collaboration
Valve and Arch have come together for two projects that will have a serious impact on the Linux distribution.
-
Hacker Successfully Runs Linux on a CPU from the Early ‘70s
From the office of "Look what I can do," Dmitry Grinberg was able to get Linux running on a processor that was created in 1971.
-
OSI and LPI Form Strategic Alliance
With a goal of strengthening Linux and open source communities, this new alliance aims to nurture the growth of more highly skilled professionals.
-
Fedora 41 Beta Available with Some Interesting Additions
If you're a Fedora fan, you'll be excited to hear the beta version of the latest release is now available for testing and includes plenty of updates.
-
AlmaLinux Unveils New Hardware Certification Process
The AlmaLinux Hardware Certification Program run by the Certification Special Interest Group (SIG) aims to ensure seamless compatibility between AlmaLinux and a wide range of hardware configurations.
-
Wind River Introduces eLxr Pro Linux Solution
eLxr Pro offers an end-to-end Linux solution backed by expert commercial support.
-
Juno Tab 3 Launches with Ubuntu 24.04
Anyone looking for a full-blown Linux tablet need look no further. Juno has released the Tab 3.
-
New KDE Slimbook Plasma Available for Preorder
Powered by an AMD Ryzen CPU, the latest KDE Slimbook laptop is powerful enough for local AI tasks.