Network Traffic Analysis On Linux Systems With Xplico Tool

Tommy Angelo

Yeni üye
25 Nis 2020
19
0
Hi everyone,

In this topic, we will be analyzing network traffic on Linux systems with tool Xplico. Let's get to the topic if you're ready.

What Is Xplico Tool? What's That Using For?

With Xplico Tool, network traffic analysis can be performed live or on pcap files that already saved. Thus, users can view the events that happen on the newtork. With this tool, we can perform the followings:

  • Monitoring the transferred data traffic instantly
  • Analyzing the network traffic
  • Capturing packets instantly
  • View visual graphics of network traffic
  • View VoIP calls
  • Analyzing network traffic within the file by loading an existing pcap file into the tool

Network Traffic With Xplico Tool

First, install the tool with the following command.

Kod:
apt-get install xplico

xCeQGS.png


Then we follow Pentesting > System Services > Xplico and press the "Xplico Start" button to run it. After this a page like this opens.

QCyTGA.png


Run the Apache service by entering the following command.

Kod:
apachectl start

SaOCAV.png


After running the service, close the terminal and follow "Pentesting > Digital Forensics" section to find and run Xplico. A page like below will open.

QVByBW.png


Select the language as Turkish. Type "xplico" for username and password both. Then just click on logging button.

VNSLKA.png


On the screen that opens, click on the "new case" button from the panel on the left side. Here we can watch our network live and upload the pcap file we have. I'm gonna perform a live network analysis now. Type a random name for the case name section. Then click on
"create" button.

yHJeTG.png


After we created the workspace, click on "New Session" from the panel which is in the left sidebar.

TxRNGx.png


Next, select session on session list. We will see this page;

IBGKb1.png


Now we are selecting "eth0" on "Interface" page. And we are starting flow.

QeCL3c.png


Now we can watch what is going on in network. We can see everything on left bar. For example; we can see captured packages, voip calls, network graphics, file trading, using chat, we can check e-mails etc.. and we can watch flow.

Now we will try to analyse our pcap file. Click "Case" text on left sidebar. And click "covers" text.

f546ez.png


Next, click "New Case" button.

zyCz48.png


Now select "pcap files" on "data collecting" page. And, we'll type a workspace name and click create button. We'll see this page;

R8CBAc.png


Now click workspace which we created. Then click on “New Session” button and type the name we just got it and click on “Create”

3x2fHd.png


We will see this page after we created session. After that, click session name.

S3UJ5C.png


We'll see this page;

66IOUG.png


Now click "Browse" on right sidebar. After that, select pcap file which is in our computer. Now we can watch network trafiic below to pcap file.

JyMPGG.png



Credits:mad:M3m0ry & @Tommy Angelo




soruce:https://www.turkhackteam.org/networ...ile-linux-sistemlerde-ag-trafigi-analizi.html
 
Son düzenleme:
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.