This project is a Python-based tool for converting PCAPNG files to HAR files. It supports both HTTP/1.1 and HTTP/2 protocols, but not HTTP/3.
This converter requires a PCAPNG file as input. If you have a PCAP file, you can convert it to PCAPNG using editcap
:
editcap <traffic.pcap> <traffic.pcapng>
Make sure the following tools are installed on your system:
- Python 3.11+
tshark
(part of the Wireshark suite; requires version >= 4.0)
- For
tshark < 4.2
, HTTP/2 streams that are compressed and chunked are not decompressed during reassembly step bytshark
. To properly handle such data, we advise you to usetshark >= 4.2
.
pip install pcapng-utils
Run pcapng_to_har [-h]
in your shell (with your Python virtual environment activated)
from pcapng_utils.pcapng_to_har import pcapng_to_har
help(pcapng_to_har)
If the captured traffic contains TLS traffic and a SSLKEYLOGFILE
has been generated during the capture, use the following command to inject the TLS client randoms read from the <keylog_file>
into the PCAPNG file:
editcap --inject-secrets tls,<keylog_file> <traffic.pcap> <traffic.pcapng>
Once the secrets have been injected into the PCAPNG file, you can use pcapng_to_har
to convert the PCAPNG file to a HAR file. The output HAR will contain the decrypted TLS traffic.
pcapng_to_har -i <traffic.pcapng> -o <traffic.har>
If the traffic has been captured on a PiRogue with the command pirogue-intercept[single|gated]
, the stacktrace of all operations (read, write) on sockets have been logged in a file socket_trace.json
. The converter will use this file to add the stacktrace information to each request and response. The attributes request._stacktrace
and response._stacktrace
will, respectively, contain the stacktrace of the socket operations that have been performed for the request and the response.
pcapng_to_har -i <traffic.pcapng> -o <traffic.har> -sf <socket_trace.json>
In case there was a systematic time shift between socket operations timestamps vs. network traffic timestamps,
you may provide the --time-shift SECONDS
flag to account for it.
Indeed socket operations timestamps come from phone date, whereas network traffic timestamps come from Pirogue date,
which may be desynchronized.
Positive shift means network traffic timestamps (Pirogue) were earlier than socket operations timestamps (phone).
Note: this enrichment is automatically performed provided that socket_trace.json
is present in the folder containing your input PCAPNG
If the traffic has been captured on a PiRogue with the command pirogue-intercept[single|gated]
, the encryption and decryption operations have been logged in a file aes_info.json
. The converter will use this file to identifies the payloads that have been encrypted before been transmitted. The encrypted payload will be replaced by its cleartext in request.postData.text
and response.content.text
.
Additional information about the encryption and decryption operations will be added to the HAR in the attributes request._decryption
and response._decryption
.
pcapng_to_har -i <traffic.pcapng> -o <traffic.har> -cf <aes_info.json>
Note: this enrichment is automatically performed provided that aes_info.json
is present in the folder containing your input PCAPNG
- Install Python 3.11 or higher.
- Install
tshark
from the Wireshark suite. - Clone this repository:
git clone https://github.com/PiRogueToolSuite/pcapng-utils
cd pcapng-utils
- Install the package in editable mode:
pip install -e .
This work is licensed under multiple licences:
- All the code in this repository is licensed under the GPLv3 license.
- Copyright: 2024 U+039b [email protected]
- Copyright: 2024 Defensive Lab Agency [email protected]
- The files containing a SPDX header are licensed under the MIT license.
- Copyright: 2024 Pôle d'Expertise de la Régulation Numérique - PEReN [email protected]