--- Initializing Forensics Module ---
[*] Loading PCAP file (150MB)... Done.
[+] Analysis Started at 14:02:00
Scanning for DNS Anomalies...
> Found 12 unique DNS queries.
> Suspicious Domain Detected: update-windows-kernel.com (192.168.1.15)
Scanning for Plaintext Credentials (HTTP/FTP)...
[!] ALERT: Basic Auth Creds Found!
User: admin | Pass: P@ssw0rd123
Source: 192.168.1.5 -> Dest: 10.0.0.80 (Port 80)
Scanning for User Agents...
> Found: Mozilla/5.0 (Windows NT 10.0; Win64; x64)
> Found: Python-urllib/2.7 (Potentially malicious script)
[*] Extraction Complete. Evidence saved to: artifacts_report.json
During network incident response, analysts often have to sift through gigabytes of packet captures (PCAPs) to find "smoking gun" evidence. While tools like Wireshark are powerful, manual inspection is slow.
I wanted to build a tool that could automate the Initial Triage phase by programmatically parsing PCAP files and extracting high-value artifacts (Credentials, DNS queries, and User Agents) without human intervention.
Using Python and the Scapy library, I built a script that iterates through network packets to identify specific protocol layers.
Forensic Capabilities: