Skip to content

extract network frames from ETL trace files and export them to .pcap

License

Notifications You must be signed in to change notification settings

aaptel/etl2pcap

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

etl2pcap

This tool allows you to extract network traffic from ETL files and exports them to the PCAP format.

How to generate an ETL trace

To start on network capture on Windows, you can run the following as Administrator:

netsh trace start capture=yes report=no tracefile=c:\mytrace.etl

You can then run this when you want to stop:

netsh trace stop

Usage

./etl2pcap.py [--verbose] foo.etl [capfile]

This will load foo.etl in memory and dump the network packets to capfile. If capfile is not given it will use the ETL name with the extension set to .pcap.

etl2pcap looks for NDIS provider events in the ETL file which are the ones holding network traffic. For each event it removes the NDIS header (3 uint32 LE) and outputs the raw ethernet fragment to the pcap file.

The pcap file can then be loaded in your usual software e.g. Wireshark.

About

extract network frames from ETL trace files and export them to .pcap

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages