Cable-Dolphin is a packet sniffer written in C, inspired by Wireshark. It allows real-time capture and analysis of network packets, offering a lightweight and efficient alternative for network traffic monitoring.
- Real-time packet capture: Capture network traffic live on specified interfaces.
- Protocol analysis: Supports common protocols such as TCP, UDP, ICMP, and more.
- Filtering: Allows filtering by protocol, port, and other criteria.
- Lightweight and fast: Built for performance, leveraging libpcap for packet capturing.
- CMake: To compile the project.
- libpcap: For packet capture functionality.
sudo apt-get update
sudo apt-get install cmake libpcap-dev
-
Clone the repository:
git clone git@github.com:Jordan-B1/cable-dolphin.git cd cable-dolphin
-
Build the project using CMake:
mkdir build cd build cmake .. make
-
Run Cable-Dolphin (you may need root privileges to capture network packets):
sudo ./cable-dolphin
-
Start capturing packets: By default, Cable-Dolphin captures packets on the default network interface.
-
Specify a network interface:
sudo ./cable-dolphin -i eth0
Replace
eth0
with the name of the interface you want to capture packets from. -
Apply filters (Soon to come): Use filters to capture specific types of traffic amongs ipv4, ipv6, tcp, udp and arp packets, for example, to capture TCP traffic:
sudo ./cable-dolphin -i eth0 -f "tcp"
-
Capture packets on a specific interface:
sudo ./cable-dolphin -i wlan0
-
Capture only TCP packets:
sudo ./cable-dolphin -f "tcp"
-
Save captured packets to a file:
sudo ./cable-dolphin -o capture.pcap
Feel free to contribute by opening issues, creating pull requests, or suggesting features. Any help is appreciated!
This project is licensed under the MIT License. See the LICENSE file for more details.