| <!DOCTYPE html> |
| <html lang="en"> |
| <head> |
| <meta charset="UTF-8"> |
| <meta name="viewport" content="width=device-width, initial-scale=1.0"> |
| <title>Packet Peeper Pro - Documentation</title> |
| <script src="https://cdn.tailwindcss.com"></script> |
| <script src="https://unpkg.com/feather-icons"></script> |
| <script src="https://cdn.jsdelivr.net/npm/vanta@latest/dist/vanta.net.min.js"></script> |
| <style> |
| .terminal { |
| font-family: 'Courier New', monospace; |
| background-color: #1a1a1a; |
| color: #00ff00; |
| border-radius: 8px; |
| overflow-y: auto; |
| padding: 1rem; |
| } |
| .code-block { |
| background-color: #1a1a1a; |
| color: #00ff00; |
| padding: 1rem; |
| border-radius: 8px; |
| font-family: 'Courier New', monospace; |
| margin: 1rem 0; |
| } |
| </style> |
| </head> |
| <body class="bg-gray-900 text-white"> |
| <div id="vanta-bg" class="fixed inset-0 z-0"></div> |
| <div class="relative z-10 container mx-auto px-4 py-8"> |
| <header class="flex justify-between items-center mb-8"> |
| <div class="flex items-center"> |
| <i data-feather="book" class="text-blue-500 mr-2"></i> |
| <h1 class="text-3xl font-bold bg-clip-text text-transparent bg-gradient-to-r from-blue-400 to-purple-500"> |
| Packet Peeper Pro Documentation |
| </h1> |
| </div> |
| <a href="index.html" class="bg-gray-700 hover:bg-gray-600 px-4 py-2 rounded-lg flex items-center"> |
| <i data-feather="arrow-left" class="mr-2"></i> Back to App |
| </a> |
| </header> |
|
|
| <div class="grid grid-cols-1 lg:grid-cols-3 gap-6"> |
| <div class="lg:col-span-2 space-y-6"> |
| <div class="bg-gray-800 bg-opacity-70 rounded-xl p-6 backdrop-blur-sm"> |
| <h2 class="text-xl font-semibold mb-4 flex items-center text-blue-400"> |
| <i data-feather="activity" class="mr-2"></i> Working with Real Network Data |
| </h2> |
| <p class="mb-4">This guide explains how to ensure Packet Peeper Pro works with real network data instead of relying on synthetic data.</p> |
| |
| <h3 class="text-lg font-semibold mt-4 text-green-400">1. Live Packet Capture</h3> |
| <p>Packet Peeper Pro uses PyShark or Scapy libraries to capture live network packets directly from your network interfaces.</p> |
| |
| <div class="code-block"> |
| <p class="text-yellow-300"># Example tcpdump command</p> |
| <p>tcpdump -i eth0 -w capture.pcap</p> |
| </div> |
|
|
| <h3 class="text-lg font-semibold mt-4 text-purple-400">2. Flow Collection (NetFlow/IPFIX/sFlow)</h3> |
| <p>Configure your network devices to export flow data:</p> |
| |
| <div class="code-block"> |
| <p class="text-yellow-300"># Example Cisco router configuration</p> |
| <p>ip flow-export version 5</p> |
| <p>ip flow-export destination <PacketPeeper-IP> 9995</p> |
| <p>ip flow-export source <Router-Interface></p> |
| <p>interface GigabitEthernet0/0</p> |
| <p class="ml-4">ip flow ingress</p> |
| </div> |
|
|
| <h3 class="text-lg font-semibold mt-4 text-red-400">3. PCAP File Import</h3> |
| <p>Public PCAP repositories with real anonymized data:</p> |
| <ul class="list-disc pl-5 space-y-1 mt-2"> |
| <li><a href="https://www.malware-traffic-analysis.net/" class="text-blue-400 hover:underline" target="_blank">Malware Traffic Analysis</a></li> |
| <li><a href="https://www.netresec.com/?page=PcapFiles" class="text-blue-400 hover:underline" target="_blank">NETRESEC PCAP files</a></li> |
| <li><a href="https://www.ll.mit.edu/r-d/datasets" class="text-blue-400 hover:underline" target="_blank">DARPA Intrusion Detection Data Sets</a></li> |
| </ul> |
| </div> |
| </div> |
|
|
| <div class="space-y-6"> |
| <div class="bg-gray-800 bg-opacity-70 rounded-xl p-6 backdrop-blur-sm"> |
| <h2 class="text-xl font-semibold mb-4 flex items-center text-yellow-400"> |
| <i data-feather="alert-triangle" class="mr-2"></i> Important Considerations |
| </h2> |
| |
| <h3 class="text-lg font-semibold mt-4">Data Verification</h3> |
| <ul class="list-disc pl-5 space-y-1 mt-2"> |
| <li>Check source and destination IPs</li> |
| <li>Verify protocol distribution</li> |
| <li>Look for expected patterns</li> |
| </ul> |
|
|
| <h3 class="text-lg font-semibold mt-4">Troubleshooting</h3> |
| <ul class="list-disc pl-5 space-y-1 mt-2"> |
| <li>Verify capture privileges</li> |
| <li>Check interface configuration</li> |
| <li>Confirm network positioning</li> |
| <li>Test with broader filters</li> |
| </ul> |
|
|
| <h3 class="text-lg font-semibold mt-4 text-red-400">Security & Privacy</h3> |
| <ul class="list-disc pl-5 space-y-1 mt-2"> |
| <li>Regulatory compliance (GDPR, HIPAA)</li> |
| <li>Anonymize sensitive data</li> |
| <li>Implement access controls</li> |
| <li>Secure stored capture files</li> |
| <li>Data retention policy</li> |
| </ul> |
| </div> |
|
|
| <div class="bg-gray-800 bg-opacity-70 rounded-xl p-6 backdrop-blur-sm"> |
| <h2 class="text-xl font-semibold mb-4 flex items-center text-green-400"> |
| <i data-feather="key" class="mr-2"></i> Quick Reference |
| </h2> |
| |
| <div class="terminal"> |
| <p class="text-yellow-300"># Common capture filters:</p> |
| <p>tcp port 80 or tcp port 443</p> |
| <p>host 192.168.1.100</p> |
| <p>net 192.168.1.0/24</p> |
| <br> |
| <p class="text-yellow-300"># Useful commands:</p> |
| <p>tcpdump -i eth0 -w capture.pcap</p> |
| <p>tshark -i eth0 -f "tcp port 80" -w http.pcap</p> |
| </div> |
| </div> |
| </div> |
| </div> |
| </div> |
|
|
| <script> |
| |
| VANTA.NET({ |
| el: "#vanta-bg", |
| mouseControls: true, |
| touchControls: true, |
| gyroControls: false, |
| minHeight: 200.00, |
| minWidth: 200.00, |
| scale: 1.00, |
| scaleMobile: 1.00, |
| color: 0x3fff00, |
| backgroundColor: 0x111111, |
| points: 10.00, |
| maxDistance: 22.00, |
| spacing: 17.00 |
| }); |
| |
| |
| feather.replace(); |
| </script> |
| </body> |
| </html> |