# Packémon [![Awesome](https://awesome.re/badge-flat2.svg)](https://github.com/caesar0301/awesome-pcaptools?tab=readme-ov-file#traffic-analysisinspection) [![version](https://img.shields.io/github/v/release/ddddddO/packemon?style=flat-square&logo=git&logoColor=3BAF75&labelColor=EEE&color=3BAF75")](https://github.com/ddddddO/packemon/releases) [![DeepWiki](https://img.shields.io/badge/DeepWiki-ddddddO%2Fpackemon-blue.svg?style=flat-square&logo=data:image/png;base64,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)](https://deepwiki.com/ddddddO/packemon) Packet monster, or `Packémon` for short! (っ‘-’)╮=͟͟͞͞◒ ヽ( '-'ヽ)
https://github.com/user-attachments/assets/08f96575-7aca-47e7-bdeb-6705ce2bbaba TUI tool for generating packets of arbitrary input and monitoring packets on any network interfaces (default: `eth0`). The list of interfaces to be specified is output when `packemon --interfaces` is run.
**This tool works on Windows, macOS, and Linux.**
This TUI tool is now available on macOS because of **[cluster2600](https://github.com/cluster2600)** support. Thanks🎉! I intend to develop it patiently🌴 The images of Packemon on REDME should be used as reference only, as they may look different from the actual Packemon. > [!WARNING] > This tool is implemented with protocol stacks from scratch and utilizes raw socket.
> There may be many bugs. If you find a bug, I would be glad if you raise an issue or give me a pull request! ## Feature This TUI tool has two major functions: packet generation and packet monitoring. |Generated DNS query
and Recieved response| Displayed DNS response detail|Filtered packets| |--|--|--| |![](./assets/packemon_dns.png)|![](./assets/packemon_dns_response.png)|![](./assets/packemon_filter.png)| This image shows packemon running in Generator / Monitor mode.
DNS query packet generated by Generator on the left is shown in **56** line of the Monitor. DNS query response packet is shown as **57** line, and a more detailed view of it is shown in the middle image.
See **[here](https://github.com/ddddddO/packemon#sending-dns-query-and-monitoring-dns-response)** for detailed instructions. Packemon's Monitor allows user to select each packet by pressing `Enter` key. Then, select any line and press `Enter` key to see the details of the desired packet. Pressing `Esc` key in the packet detail screen will return you to the original packet list screen. The rightmost image shows how the packet list is filtered. ### Generator - Send generated packets to any network interfaces. - You can specify network interface with `--interface` flag. Default is `eth0`. - Packets of various protocols are supported.
details - [x] Ethernet - [x] ARP (WIP) - [x] IPv4 (WIP) - [x] IPv6 (WIP) - [x] ICMPv4 (WIP) - [ ] ICMPv6 - [x] TCP (WIP) - [x] UDP (WIP) - [x] TLSv1.2 (WIP) - This tool is not very useful because the number of cipher suites it supports is still small, but an environment where you can try it out can be found [here](./cmd/debugging/https-server/README.md). - TCP 3way handshake ~ TLS handshake ~ TLS Application data (encrypted HTTP) - Supported cipher suites include - `TLS_RSA_WITH_AES_128_GCM_SHA256` - You can check the server for available cipher suites with the following command - `nmap --script ssl-enum-ciphers -p 443 ` - [x] TLSv1.3 (WIP) - This tool is not very useful because the number of cipher suites it supports is still small, but an environment where you can try it out can be found [here](./cmd/debugging/https-server/README.md). - TCP 3way handshake ~ TLS handshake ~ TLS Application data (encrypted HTTP) - Supported cipher suites include - `TLS_CHACHA20_POLY1305_SHA256` - [x] DNS (WIP) - [x] HTTP (WIP) - [ ] xxxxx.... - [ ] Routing Protocols - IGP (Interior Gateway Protocol) - [ ] OSPF (Open Shortest Path First) - [ ] EIGRP (Enhanced Interior Gateway Routing Protocol) - [ ] RIP (Routing Information Protocol) - EGP (Exterior Gateway Protocol) - [ ] BGP (Border Gateway Protocol) - [Currently there is only debug mode](./cmd/debugging/bgp/README.md) - TCP 3way handshake ~ Open ~ Keepalive ~ Update ~ Notification
>[!WARNING] > While using Generator mode, TCP RST packets automatically sent out by the kernel are dropped. When this mode is stopped, the original state is restored. Probably😅. > Incidentally, dropping RST packets is done by running [the eBPF program](./tc_program/). > The background note incorporating the eBPF is the POST of X around [here](https://x.com/ddddddOpppppp/status/1798715056513056881). >[!TIP] > While in Generator mode, output of `bpf_printk` of [eBPF program](https://github.com/ddddddO/packemon/blob/main/tc_program/tc_program.bpf.c) can be checked by executing the following command.
> $ **sudo mount -t debugfs none /sys/kernel/debug** (only once)
> $ **sudo cat /sys/kernel/debug/tracing/trace_pipe** ### Monitor - Monitor any network interfaces. - You can specify network interface with `--interface` flag. Default is `eth0`. - Can filter packets to be displayed. - You can filter the values for each item (e.g. `Dst`, `Proto`, `SrcIP`...etc.) displayed in the listed packets. - Specified packets can be saved to pcapng file. - Packets of various protocols are supported.
details - [x] Ethernet - [x] ARP - [x] IPv4 (WIP) - [x] IPv6 (WIP) - [x] ICMPv4 (WIP) - [ ] ICMPv6 - [x] TCP (WIP) - [x] UDP - [x] TLSv1.2 (WIP) - [ ] TLSv1.3 - [ ] DNS (WIP) - [x] DNS query - [x] DNS query response - [ ] xxxxx.... - [ ] HTTP (WIP) - [x] HTTP GET request - [x] HTTP GET response - [ ] xxxxx.... - [ ] xxxxx.... - [ ] Routing Protocols - IGP (Interior Gateway Protocol) - [ ] OSPF (Open Shortest Path First) - [ ] EIGRP (Enhanced Interior Gateway Routing Protocol) - [ ] RIP (Routing Information Protocol) - EGP (Exterior Gateway Protocol) - [ ] BGP (Border Gateway Protocol)
>[!WARNING] > If packet parsing fails, it is indicated by “Proto:ETHER” as shown in the following image. > > ![](./assets/failed_parse_packet.png) > > If you want to check the details of the packet, you can select the line, save it to a pcapng file, and import it into Wireshark or other software🙏 ## Installation ### Source build > [!IMPORTANT] > For Linux, require 'Dependencies' section of https://ebpf-go.dev/guides/getting-started/#ebpf-c-program
> For Windows, require [Npcap](https://npcap.com/). Check the following
> - `Support raw 802.11 traffic (and monitor mode) for wireless adapters` > - `Install Npcap in WinPcap API-compatible Mode`
$ git clone git@github.com:ddddddO/packemon.git
$ cd packemon
(For Linux)
$ cd tc_program/ && go generate && cd -
(For Linux or macOS)
$ go build -o packemon cmd/packemon/*.go
$ ls | grep packemon
$ mv packemon /usr/local/bin/
(For Windows)
$ go build -o packemon.exe .\cmd\packemon\
### Package manager > [!IMPORTANT] > It might be that the generation of the executable file is failing. At that time, install it in another way! For arm64, convert “amd64” to “arm64” in the following commands and execute them.
deb
$ export PACKEMON_VERSION=X.X.X
$ curl -o packemon.deb -L https://github.com/ddddddO/packemon/releases/download/v$PACKEMON_VERSION/packemon_$PACKEMON_VERSION-1_amd64.deb
$ dpkg -i packemon.deb

rpm
$ export PACKEMON_VERSION=X.X.X
$ (Ubuntu) yum install https://github.com/ddddddO/packemon/releases/download/v$PACKEMON_VERSION/packemon_$PACKEMON_VERSION-1_amd64.rpm
or
$ (Fedora) dnf install https://github.com/ddddddO/packemon/releases/download/v$PACKEMON_VERSION/packemon_$PACKEMON_VERSION-1_amd64.rpm

apk
$ export PACKEMON_VERSION=X.X.X
$ curl -o packemon.apk -L https://github.com/ddddddO/packemon/releases/download/v$PACKEMON_VERSION/packemon_$PACKEMON_VERSION-1_amd64.apk
$ apk add --allow-untrusted packemon.apk

Homebrew
$ brew install ddddddO/tap/packemon
#### Confirmed executable in the following environments - OS: Debian GNU/Linux 12 (bookworm) on WSL2 - Kernel: 5.15.167.4-microsoft-standard-WSL2 - Architecture: x86_64 - OS: Ubuntu 22.04.3 LTS on WSL2 - Kernel: 5.15.167.4-microsoft-standard-WSL2 - Architecture: x86_64 - OS: Fedora Linux 42 on WSL2 - Kernel: 5.15.167.4-microsoft-standard-WSL2 - Architecture: x86_64 - OS: Debian GNU/Linux 12 (bookworm) on Google Pixel 7a - Kernel: 6.1.0-34-arm64 - Architecture: aarch64 - OS: macOS - OS: Windows 11 Pro - Confirm MAC address of default gateway (via PowerShell) ```console PS > $defaultGateway = (Get-NetRoute -DestinationPrefix "0.0.0.0/0" | Sort-Object -Property InterfaceMetric | Select-Object -First 1).NextHop PS > echo $defaultGateway 192.168.10.1 PS > Get-NetNeighbor -IPAddress $defaultGateway | Select-Object -ExpandProperty LinkLayerAddress ```
cmd - OS: `cat /etc/os-release` - Kernel: `uname -r` - Architecture: `uname -m`
### Go install For macOS, besides Homebrew, this is also easy. > [!IMPORTANT] > For Windows, require [Npcap](https://npcap.com/). Check the following
> - `Support raw 802.11 traffic (and monitor mode) for wireless adapters` > - `Install Npcap in WinPcap API-compatible Mode`
$ go install github.com/ddddddO/packemon/cmd/packemon@latest
## Usage ### Generator ```console $ sudo setcap cap_net_raw,cap_bpf,cap_sys_admin,cap_net_admin+ep /path/to/packemon $ packemon --send ``` or ```console $ sudo packemon --send ``` ### Monitor ```console $ sudo setcap cap_net_raw+ep /path/to/packemon $ packemon ``` or ```console $ sudo packemon ``` ## Usecase ### Sending DNS query and Monitoring DNS response 1. setup ```sh # Generator $ sudo packemon --send ``` ```sh # Monitor $ sudo packemon ``` ← Generator | Monitor → ![](./assets/packemon_dns.png) 2. Generator - `Lα` > `Ethernet` > `Ether Type` > **IPv4** - `Lβ` > `IPv4` > `Protocol` > **UDP** - `Lβ` > `IPv4` > `Destination IP Addr` > **1.1.1.1** - Enter the address of DNS resolver here. Above is the address of Cloudflare resolver. - `Lγ` > `UDP` > `Destination Port` > **53** - `Lγ` > `UDP` > `Automatically calculate length ?` > **(Check!)** - `Lε` > `DNS` > `Queries Domain` > **go.dev** - Enter here the domain for which you want to name resolution. - `Lε` > `DNS` > Click on **Send!** - At this time, DNS query is sent with the contents set so far. ![](./assets/packemon_dns_response_2.png) 3. Monitor - Find records where `Proto`: **DNS** and `DstIP` or `SrcIP` is **1.1.1.1**. Select each record to see the packet structure of the DNS query and the packet structure of the DNS response. - List ![](./assets/sending_dns_query_and_monitoring_dns_response/3.png) - DNS query (`DstIP: 1.1.1.1`) ![](./assets/sending_dns_query_and_monitoring_dns_response/4.png) - DNS response (`SrcIP: 1.1.1.1`) ![](./assets/sending_dns_query_and_monitoring_dns_response/5.png) ## Another feature
⚠️ Might be repealed The local node's browser can monitor packets from remote nodes or send arbitrary packets from remote nodes. ``` +-------------------------------------+ +----------------------+ | REMOTE NODE | | LOCAL NODE (Browser) | | $ sudo packemon-api --interface xxx | | Monitor <---------|-- WebSocket --|--> HTTP GET /ws <-----+ | | Generator ---------|-- POST packet --|--> HTTP POST /packet | | +----------------------+ | -> parse packet | | +---------------+ | -> Network Interface -----|-- Send packet -->| TARGET NODE x | +-------------------------------------+ | | +---------------+ ``` - Remote node ![](./assets/packemon_api_remote.png) - Local node ![](./assets/packemon_api_local.png) >[!WARNING] > Please note that the following is dangerous. The following procedure is an example of how you can expose packemon-api to the outside world and monitor and send remote node packets on your browser. 1. (REMOTE) Please install `packemon-api` and run. ```console $ go install github.com/ddddddO/packemon/cmd/packemon-api@latest $ sudo packemon-api --interface wlan0 ``` 1. (REMOTE) Run [`ngrok`](https://ngrok.com/) and note the URL to be paid out. ```console $ ngrok http 8082 ``` 1. (LOCAL) Enter the dispensed URL into your browser and you will be able to monitor and send packets to remote node.
## Related tools - [Wireshark](https://www.wireshark.org/) - [tcpdump](https://www.tcpdump.org/) - netcat(nc) - [Nmap](https://nmap.org/) - [Scapy](https://github.com/secdev/scapy) - [google/gopacket](https://github.com/google/gopacket) / [gopacket/gopacket](https://github.com/gopacket/gopacket) (maintained) ## Acknowledgments - [rivo/tview](https://github.com/rivo/tview) - Packemon is using this TUI library. - [Golangで作るソフトウェアルータ](https://booth.pm/ja/items/5290391) - The way Go handles syscalls, packet checksum logic, etc. was helpful. Packemon was inspired by this book and began its development. This is a book in Japanese. ## Document - [ネットワークを知りたくて](https://zenn.dev/openlogi/articles/195d07bd9bc5b4) ``` ⌒丶、_ノ⌒丶、_ノ⌒丶、_ノ⌒丶、_ノ⌒丶、_ノ⌒丶、_ノ              ○            о           。           ,、-、_  __     ,、-―、_,、'´    ̄  `ヽ,    /       ・    .   l、    l,       ヾニニつ    `ヽ、     |                  `ヽ,     ノ                  ノ    /::::                 /  /:::::::                ..::l、 /::::::::::::::::::......:::::::.       ............::::::::::`l, l::::::::::::::::::::::::::::::::::::......   ....:::::::::::::::::::::::::::::`l, ヽ,:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::ノ    ̄ ̄``ヽ、_:::::::::::::::::::::::,、-―´ ̄`ヽ、,、-'          `ヽ―-―'´ ``` ## Stargazers over time [![Stargazers over time](https://starchart.cc/ddddddO/packemon.svg?variant=adaptive)](https://starchart.cc/ddddddO/packemon) ## Log (japanese)
xxx ## Links - 「Golangで作るソフトウェアルータ」 - その実装コード: https://github.com/sat0ken/go-curo - https://terassyi.net/posts/2020/03/29/ethernet.html - 動作確認用コマンドの参考 - https://zenn.dev/takai404/articles/76d47e944d8e18 - [Scrapboxメモ書き](https://scrapbox.io/ddddddo/%E3%83%8D%E3%83%83%E3%83%88%E3%83%AF%E3%83%BC%E3%82%AF%E7%B3%BB%E8%AA%AD%E3%81%BF%E7%89%A9) - WSL2のDebianで動作した。 - 任意の Ethernet ヘッダ / IPv4 ヘッダ / ARP / ICMP を楽に作れてフレームを送信できる - 以下はtmuxで3分割した画面に各種ヘッダのフォーム画面を表示している。そして ICMP echo request を送信し、 echo reply が返ってきていることを Wireshark で確認した様子 ![](./assets/tui_ether_ip_icmp.png) ![](./assets/tui_send_icmp_result1.png) ![](./assets/tui_send_icmp_result2.png) - フレームを受信して詳細表示(ARPとIPv4) ![](./assets/tui_send_recieve.png)
少し前のUI(`5062561` のコミット) ![](./assets/tui_0428.png) ![](./assets/tui_cap_0428.png)
- TUIライブラリとして https://github.com/rivo/tview を使わせてもらってる🙇 ### 動作確認 #### Raspberry Piで簡易http server ```console pi@raspberrypi:~ $ sudo go run main.go ``` #### パケットキャプチャ ```console $ sudo tcpdump -U -i eth0 -w - | /mnt/c/Program\ Files/Wireshark/Wireshark.exe -k -i - ``` - 受信画面 ```console $ sudo go run cmd/packemon/main.go ``` - 送信画面 ```console $ sudo go run cmd/packemon/main.go --send ``` - 単発フレーム送信コマンド(e.g. ARP request) ```console $ sudo go run cmd/packemon/main.go --debug --send --proto arp ``` #### TLS version 指定でリクエスト ```console # TLS v1.2 でリクエスト $ curl -k -s -v --tls-max 1.2 https://192.168.10.112:10443 # TLS v1.3 でリクエスト $ curl -k -s -v --tls-max 1.3 https://192.168.10.112:10443 # TLS v1.3 で cipher suites を指定してリクエスト(ただし、Client Hello の Cipher Suites のリストが、その指定のみになるわけではなく、一番上(最優先)にくるというもの(パケットキャプチャで確認)) $ curl -k -s -v --tls-max 1.3 --tls13-ciphers "TLS_CHACHA20_POLY1305_SHA256" https://192.168.10.112:10443 ``` #### 手軽にブロードキャスト ```console $ arping -c 1 1.2.3.4 ARPING 1.2.3.4 from 172.23.242.78 eth0 Sent 1 probes (1 broadcast(s)) Received 0 response(s) ``` #### tcpでdns ```console $ nslookup -vc github.com ``` #### WSL2でIPv6有効化 - [ref](https://github.com/ddddddO/packemon/issues/91#issue-2797391798) #### ipv6でping どうするか ```console $ ip -6 route $ ping -c 1 fe80::1 ``` #### 自前実装の tcp 3way handshake ```console $ sudo go run cmd/packemon/main.go --send --debug --proto tcp-3way-http ``` ### 動作確認の様子
xxx - Ethernetフレームのみ作って送信(`77c9149` でコミットしたファイルにて) ![](./assets/Frame.png) - ARPリクエストを作って送信(`390f266` でコミットしたファイルにて。中身はめちゃくちゃと思うけど) ![](./assets/ARP.png) - ARPリクエストを受信してパース(`b6a025a` でコミット) ![](./assets/ARP_request_console.png) ![](./assets/ARP_request.png)