网络包处理工具NetBee

What is NetBee?

NetBee is a new library intended for several types of packet processing, such as packet sniffing and filtering, packet decoding, and traffic classification (not ready yet).

NetBee provides a set of modules that can be used by applications that need to process network packets. Instead of creating some custom code in your application for packet processing, you can use the functions exported by NetBee.

This library is made up of several components. It includes several objects for packet decoding, packet sniffing and filtering, traffic classification (not ready yet), and some miscellaneous utilities. Additionally, it includes some components (such as the NetPDL protocol definition language, the NetVM packet processing virtual machine) that are used to do its job, but their knowledge is not required from programmers using NetBee. For a list of features that are present in NetBee, please look at the introduction page.

Why NetBee?

NetBee is a powerful library for generic packet processing. NetBee is created by the same research group that created WinPcap, the de-facto standard for sniffing packets in Windows. However, WinPcap architecture (which is derived from its UNIX ancestor, libpcap) is rather old and it does not fit for nowadays needs. WinPcap is a perfect choice in case you need a powerful library for sniffing packets with cross platform compatibility (WinPcap and the UNIX-based libpcap are almost fully compatible). However, the architecture behind WinPcap (and libpcap) has not been engineered for supporting extensions and new modules for other kinds of processing in addition to packet sniffing.

This is the reason of NetBee: we feel that the effort needed to expand and update WinPcap cannot pay in the long term. We believe that the best choice is to create a new library from scratch, with a completely new architecture (object-based, for instance), open to extensions and ready to fit to new needs. NetBee, in fact. This guarantees an high degree of freedom but, of course, it will often lead to un-tested code due to the relative poor maturity of the library.

If you start using NetBee and you used WinPcap in the past, you will see that the interface (which is object oriented) is much cleaner than its ancestor. You can find it is pretty easy to read packets from the network as well as from a file or from some other source. This is due to the object-oriented architecture of NetBee. You will be surprised how easy is to use NetBee in your programs.

Please note that NetBee is highly experimental at the current stage; no guarantees are given that the API will not change in the future. Therefore, the current release must be intended as a proof of concept in order to share some ideas with the research community.

http://www.nbee.org/doku.php

时间: 2024-11-14 05:02:00

网络包处理工具NetBee的相关文章

iperf/netperf网络性能测试工具、Wireshark网络包分析工具

iperf   http://www.linuxidc.com/Linux/2014-05/101160.htm netperf  http://www.linuxidc.com/Linux/2013-07/87975.htm Wireshark  http://www.linuxidc.com/Linux/2013-05/84174.htm

13个演示实例搞定RPM包管理工具

写在前面:如果此文有幸被某位朋友看见并发现有错的地方,希望批评指正.如有不明白的地方,愿可一起探讨. RPM是个什么东西? RPM以前是"RedHat Package Manager"的简称,现改为"RPM is Package Manager".在Linux/Unix操作系统上,RPM包管理工具允许系统管理员安装.更新.卸载.查询.验证和管理RPM包.下图为RPM包管理工具所具备的基本功能. 准备工作 为了更好的演示RPM包管理工具,我们需要将光盘镜像挂载到文件系

五个好用的网络协议分析工具(附下载)

Network Packet Analyzer,是一种网络分析程序,可以帮助网络管理员捕获.交互式浏览网络中传输的数据包和分析数据包信息等.这里给出了5个最好的网络数据包分析工具,具体如下: 1. Wireshark 相信大家都很熟悉,就不多介绍了.Wireshark网络嗅探器是最受欢迎的免费网络嗅探器之一,它能够在Unix系统和Win系统下运行. 下载:http://www.wireshark.org/download.html 2. Microsoft Network Monitor Mic

HP 打印机驱动移植到Fedora 9,以及其它新系统(无包管理工具)

实现目标: fedora 9 上支持hp officejet 100 mobile driver,并且移植到新的x系统上(无包管理工具) 由于HP官方网站打印机驱动仅支持Fedora17,18,19,20,还好HP提供了驱动源码,我们可以自己编译和安装.下面是我将HP驱动移植到Fedora9上的过程,供各位参考. 1. 安装环境的配置 su -c "yum -y -d 10 -e 1 install avahi-tools cups cups-devel dbus-devel gcc-c++ g

网络流量查看工具为 iftop

作者: daodaoliang 时间: 2016年5月23日 版本: v0.0.1 邮箱: [email protected] 日常用的网络流量查看工具为 iftop, 但是他仅仅只能简单的查看网络的流量情况,若是想要查看某个链接的流量情况就比较困难了,因此再次推荐iftop 这个工具 0x01 安装 iftop 我是官方网站 编译安装iftop示例: 1 2 3 4 5 # centos yum install flex byacc libpcap ncurses ncurses-devel

不可不知的网络知识与工具

不可不知的网络知识与工具 通常在开发.测试.生产上会遇到各种各样的网络问题,如何快速定位问题,需要了解相关知识,掌握相关工具. 1.私有IP的地址 私有IP就是在本地局域网上的IP,与之对应的是公有IP.由于我们目前使用的IPv4协议的限制,现在IP地址的数量是有限的.这样,我们就不能为居于互联网中的每一台计算机分配一个公网IP.所以,在局域网中的每台计算机就只能使用私有IP地址了.私有IP地址是一段保留的IP地址,只是使用在局域网中,在Internet上是不使用的.我们可以根据需要来选择适当的

Python黑帽编程1.3 Python运行时与包管理工具

Python黑帽编程1.3  Python运行时与包管理工具 0.1  本系列教程说明 本系列教程,采用的大纲母本为<Understanding Network Hacks Attack and Defense with Python>一书,为了解决很多同学对英文书的恐惧,解决看书之后实战过程中遇到的问题而作.由于原书很多地方过于简略,笔者根据实际测试情况和最新的技术发展对内容做了大量的变更,当然最重要的是个人偏好.教程同时提供图文和视频教程两种方式,供不同喜好的同学选择. 0.2 前言 前两

Linux命令行抓包及包解析工具tshark(wireshark)使用实例解析

在Linux下,当我们需要抓取网络数据包分析时,通常是使用tcpdump抓取网络raw数据包存到一个文件,然后下载到本地使用wireshark界面网络分析工具进行网络包分析. 最近才发现,原来wireshark也提供有Linux命令行工具-tshark.tshark不仅有抓包的功能,还带了解析各种协议的能力.下面我们以两个实例来介绍tshark工具.1.安装方法 CentOS: yum install -y wireshark    Ubuntu: apt-get install -y tsha

Fiddler抓手机网络包

Fiddler是一个强大的http和https抓包工具,在移动开发中,用Fiddler给手机抓网络包对开发和调试带来极大的好处.下面介绍一下具体用法: 1.第一步设置手机代理,打开手机网络设置,改为手动设置代理,ip地址写上自己电脑的IP,端口号写8888(因为finddler默认监听的端口号是8888,如果电脑8888端口号有冲突可以在fiddler里修改) 2.完成第一步后就可以抓取从手机端的HTTP包了,如果自己的客户端有HTTPS请求,非正式环境可以设置跳过证书校验,如果是正式环境则需要