2 #------------------------------------------------------------------------------
3 # $File: sniffer,v 1.19 2013/01/06 01:11:04 christos Exp $
4 # sniffer: file(1) magic for packet capture files
6 # From: guy@alum.mit.edu (Guy Harris)
10 # Microsoft Network Monitor 1.x capture files.
12 0 string RTSS NetMon capture file
13 >5 byte x - version %d
15 >6 leshort 0 (Unknown)
16 >6 leshort 1 (Ethernet)
17 >6 leshort 2 (Token Ring)
20 >6 leshort >4 (type %d)
23 # Microsoft Network Monitor 2.x capture files.
25 0 string GMBU NetMon capture file
26 >5 byte x - version %d
28 >6 leshort 0 (Unknown)
29 >6 leshort 1 (Ethernet)
30 >6 leshort 2 (Token Ring)
33 >6 leshort 5 (IP-over-IEEE 1394)
38 >6 leshort >9 (type %d)
41 # Network General Sniffer capture files.
42 # Sorry, make that "Network Associates Sniffer capture files."
43 # Sorry, make that "Network General old DOS Sniffer capture files."
45 0 string TRSNIFF\ data\ \ \ \ \032 Sniffer capture file
46 >33 byte 2 (compressed)
47 >23 leshort x - version %d
49 >32 byte 0 (Token Ring)
53 >32 byte 4 (PC Network broadband)
54 >32 byte 5 (LocalTalk)
56 >32 byte 7 (Internetwork Analyzer)
61 # Cinco Networks NetXRay capture files.
62 # Sorry, make that "Network General Sniffer Basic capture files."
63 # Sorry, make that "Network Associates Sniffer Basic capture files."
64 # Sorry, make that "Network Associates Sniffer Basic, and Windows
65 # Sniffer Pro", capture files."
66 # Sorry, make that "Network General Sniffer capture files."
67 # Sorry, make that "NetScout Sniffer capture files."
69 0 string XCP\0 NetXRay capture file
70 >4 string >\0 - version %s
71 >44 leshort 0 (Ethernet)
72 >44 leshort 1 (Token Ring)
76 >44 leshort 9 (802.11)
79 # "libpcap" capture files.
80 # (We call them "tcpdump capture file(s)" for now, as "tcpdump" is
81 # the main program that uses that format, but there are other programs
82 # that use "libpcap", or that use the same capture file format.)
85 >4 beshort x - version %d
87 >20 belong 0 (No link-layer encapsulation
88 >20 belong 1 (Ethernet
89 >20 belong 2 (3Mb Ethernet
93 >20 belong 6 (Token Ring
94 >20 belong 7 (BSD ARCNET
98 >20 belong 11 (RFC 1483 ATM
100 >20 belong 13 (BSD/OS SLIP
101 >20 belong 14 (BSD/OS PPP
102 >20 belong 19 (Linux ATM Classical IP
103 >20 belong 50 (PPP or Cisco HDLC
104 >20 belong 51 (PPP-over-Ethernet
105 >20 belong 99 (Symantec Enterprise Firewall
106 >20 belong 100 (RFC 1483 ATM
107 >20 belong 101 (raw IP
108 >20 belong 102 (BSD/OS SLIP
109 >20 belong 103 (BSD/OS PPP
110 >20 belong 104 (BSD/OS Cisco HDLC
111 >20 belong 105 (802.11
112 >20 belong 106 (Linux Classical IP over ATM
113 >20 belong 107 (Frame Relay
114 >20 belong 108 (OpenBSD loopback
115 >20 belong 109 (OpenBSD IPsec encrypted
116 >20 belong 112 (Cisco HDLC
117 >20 belong 113 (Linux "cooked"
118 >20 belong 114 (LocalTalk
119 >20 belong 117 (OpenBSD PFLOG
120 >20 belong 119 (802.11 with Prism header
121 >20 belong 122 (RFC 2625 IP over Fibre Channel
122 >20 belong 123 (SunATM
123 >20 belong 127 (802.11 with radiotap header
124 >20 belong 129 (Linux ARCNET
125 >20 belong 138 (Apple IP over IEEE 1394
126 >20 belong 139 (MTP2 with pseudo-header
130 >20 belong 143 (DOCSIS
132 >20 belong 147 (Private use 0
133 >20 belong 148 (Private use 1
134 >20 belong 149 (Private use 2
135 >20 belong 150 (Private use 3
136 >20 belong 151 (Private use 4
137 >20 belong 152 (Private use 5
138 >20 belong 153 (Private use 6
139 >20 belong 154 (Private use 7
140 >20 belong 155 (Private use 8
141 >20 belong 156 (Private use 9
142 >20 belong 157 (Private use 10
143 >20 belong 158 (Private use 11
144 >20 belong 159 (Private use 12
145 >20 belong 160 (Private use 13
146 >20 belong 161 (Private use 14
147 >20 belong 162 (Private use 15
148 >20 belong 163 (802.11 with AVS header
149 >20 belong 165 (BACnet MS/TP
151 >20 belong 169 (GPRS LLC
152 >20 belong 177 (Linux LAPD
153 >20 belong 187 (Bluetooth HCI H4
154 >20 belong 189 (Linux USB
156 >20 belong 195 (802.15.4
158 >20 belong 197 (Endace ERF
159 >20 belong 201 (Bluetooth HCI H4 with pseudo-header
160 >20 belong 202 (AX.25 with KISS header
162 >20 belong 204 (PPP with direction pseudo-header
163 >20 belong 205 (Cisco HDLC with direction pseudo-header
164 >20 belong 206 (Frame Relay with direction pseudo-header
165 >20 belong 209 (Linux IPMB
166 >20 belong 215 (802.15.4 with non-ASK PHY header
167 >20 belong 220 (Memory-mapped Linux USB
168 >20 belong 224 (Fibre Channel FC-2
169 >20 belong 225 (Fibre Channel FC-2 with frame delimiters
170 >20 belong 226 (Solaris IPNET
171 >20 belong 227 (SocketCAN
172 >20 belong 228 (Raw IPv4
173 >20 belong 229 (Raw IPv6
174 >20 belong 230 (802.15.4 without FCS
175 >20 belong 231 (D-Bus messages
176 >20 belong 235 (DVB-CI
177 >20 belong 236 (MUX27010
178 >20 belong 237 (STANAG 5066 D_PDUs
179 >20 belong 239 (Linux netlink NFLOG messages
180 >20 belong 240 (Hilscher netAnalyzer
181 >20 belong 241 (Hilscher netAnalyzer with delimiters
182 >20 belong 242 (IP-over-Infiniband
183 >20 belong 243 (MPEG-2 Transport Stream packets
184 >20 belong 244 (ng4t ng40
185 >20 belong 245 (NFC LLCP
186 >20 belong 247 (Infiniband
188 >16 belong x \b, capture length %d)
190 0 ubelong 0xa1b2c3d4 tcpdump capture file (big-endian)
191 !:mime application/vnd.tcpdump.pcap
193 0 ulelong 0xa1b2c3d4 tcpdump capture file (little-endian)
194 !:mime application/vnd.tcpdump.pcap
198 # "libpcap"-with-Alexey-Kuznetsov's-patches capture files.
199 # (We call them "tcpdump capture file(s)" for now, as "tcpdump" is
200 # the main program that uses that format, but there are other programs
201 # that use "libpcap", or that use the same capture file format.)
203 0 ubelong 0xa1b2cd34 extended tcpdump capture file (big-endian)
205 0 ulelong 0xa1b2cd34 extended tcpdump capture file (little-endian)
209 # "pcap-ng" capture files.
210 # http://www.winpcap.org/ntar/draft/PCAP-DumpFileFormat.html
211 # Pcap-ng files can contain multiple sections. Printing the endianness,
212 # snaplen, or other information from the first SHB may be misleading.
215 >8 ubelong 0x1a2b3c4d pcap-ng capture file
216 >>12 beshort x - version %d
219 >8 ulelong 0x1a2b3c4d pcap-ng capture file
220 >>12 leshort x - version %d
224 # AIX "iptrace" capture files.
226 0 string iptrace\ 1.0 "iptrace" capture file
227 0 string iptrace\ 2.0 "iptrace" capture file
230 # Novell LANalyzer capture files.
232 0 leshort 0x1001 LANalyzer capture file
233 0 leshort 0x1007 LANalyzer capture file
236 # HP-UX "nettl" capture files.
238 0 string \x54\x52\x00\x64\x00 "nettl" capture file
241 # RADCOM WAN/LAN Analyzer capture files.
243 0 string \x42\xd2\x00\x34\x12\x66\x22\x88 RADCOM WAN/LAN Analyzer capture file
246 # NetStumbler log files. Not really packets, per se, but about as
247 # close as you can get. These are log files from NetStumbler, a
248 # Windows program, that scans for 802.11b networks.
250 0 string NetS NetStumbler log file
251 >8 lelong x \b, %d stations found
254 # *Peek tagged capture files.
256 0 string \177ver EtherPeek/AiroPeek/OmniPeek capture file
259 # Visual Networks traffic capture files.
261 0 string \x05VNF Visual Networks traffic capture file
264 # Network Instruments Observer capture files.
266 0 string ObserverPktBuffe Network Instruments Observer capture file
269 # Files from Accellent Group's 5View products.
271 0 string \xaa\xaa\xaa\xaa 5View capture file