PCAP Analyzer

name: pcap-analyzer description: Analyze PCAP/PCAPNG files with tshark and produce a structured network-forensics summary (talkers, ports, DNS, TLS, HTTP, anomalies). homepage: https://www.wireshark.org/docs/man-pages/tshark.html metadata: { "openclaw": { "emoji": "🦈", "requires": { "bins": ["tshark", "awk", "sed"], "files": ["/home/tom/openclaw-tools/pcap_summary.sh"] }, "notes": [ "This skill runs local analysis only. It does not exfiltrate the PCAP.", "Prefer read-only access; do not modify user files." ] } } ---

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "PCAP Analyzer" with this command: npx skills add pcap-analyzer

name: pcap-analyzer description: Analyze PCAP/PCAPNG files with tshark and produce a structured network-forensics summary (talkers, ports, DNS, TLS, HTTP, anomalies). homepage: https://www.wireshark.org/docs/man-pages/tshark.html metadata: { "openclaw": { "emoji": "🦈", "requires": { "bins": ["tshark", "awk", "sed"], "files": ["/home/tom/openclaw-tools/pcap_summary.sh"] }, "notes": [ "This skill runs local analysis only. It does not exfiltrate the PCAP.", "Prefer read-only access; do not modify user files." ] } }

PCAP Analyzer (tshark)

This skill turns packet captures into a practical report a human can act on. It is designed for lab work, incident triage, and CPENT-style exercises.

What it produces

A structured report with:

  • Capture metadata: file type, size, first/last timestamp (if available)
  • Top talkers: endpoints by packets/bytes (IPv4/IPv6 when present)
  • Conversations: top TCP/UDP conversations
  • Service/port view: top TCP/UDP destination ports
  • DNS: most common queried names + suspicious patterns (DGA-ish, long labels)
  • TLS: SNI / Server Name and common JA3-like fingerprints when present (best-effort)
  • HTTP: host headers / URLs when present (best-effort, only if decrypted/plain)
  • Anomalies (best-effort heuristics):
    • SYN-only scans / high SYN rate
    • excessive RSTs
    • retransmission bursts
    • rare destination ports
    • single host contacting many unique hosts (beaconing-like)

Inputs

You must provide:

  • pcap_path: Full path to a .pcap or .pcapng file on this machine.

Optional:

  • focus_host: IP to focus on (filters summaries around that host)
  • time_window: A display filter time window if user specifies (best-effort guidance only)

How to run (terminal)

{baseDir}/scripts/analyze.sh "/full/path/to/capture.pcapng"

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

http-retry

Automatically retries HTTP requests with exponential backoff, timeout control, and connection pooling to handle network errors and rate limits.

Registry SourceRecently Updated
General

Email Resend

Send and receive emails using the Resend API. Use for: (1) sending emails directly via Resend API, (2) receiving email notifications via cron, (3) drafting r...

Registry SourceRecently Updated
1.2K0ivelin
General

Roundtable Adaptive

Adaptive multi-model AI roundtable. Runs up to 4 AI models (configurable) in 2 debate rounds with cross-critique and formal consensus scoring. Requires a con...

Registry SourceRecently Updated
General

EvoMap Node Controller

管理 EvoMap 节点的启动、配置和监控。用于在服务器上启动/停止 EvoMap evolver 循环、配置节点 ID,处理节点绑定等。使用场景:用户要求启动/停止 EvoMap 节点、查看节点状态、配置节点 ID、解决节点连接问题。⚠️ 使用前必须配置环境变量。

Registry SourceRecently Updated