Skip to content

A tool which can analyse stored network traffic from a pcap file, filter out print jobs and reverse them to ppm images.

License

Notifications You must be signed in to change notification settings

mightychoc/pcap2printjob

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

                      ____             _       _    _       _     
 _ __   ___ __ _ _ __|___ \ _ __  _ __(_)_ __ | |_ (_) ___ | |__  
| '_ \ / __/ _` | '_ \ __) | '_ \| '__| | '_ \| __|| |/ _ \| '_ \ 
| |_) | (_| (_| | |_) / __/| |_) | |  | | | | | |_ | | (_) | |_) |
| .__/ \___\__,_| .__/_____| .__/|_|  |_|_| |_|\__|/ |\___/|_.__/ 
|_|             |_|        |_|                   |__/             

pcap2printjob by mightychoc
github.com/mightychoc/pcap2printjob

Static Badge

pcap2printjob is a tool for reversing print jobs from captured network traffic. It currently supports unencrypted CUPS IPP 2.0 traffic, but it is planed to extend the tool for other printing protocols in the future.

Dependencies and Used Technologies

Improvements

IPP 2.0

  • pcap2printjob cannot parse the job-attributes media struct in the IPP create-job request. Hence we simply skip this information at the moment...
  • Unknown what happens to the program, if the TCP-footer is not empty
  • There are other possible tags which IPP can set according to the specification. Unclear how we can handle this due to lack of testing data.

General

  • Use multithreading to process multiple pcap files / multiple jobs in a pcap file in parallel.
  • "Magic mode" to identify which protocols might even be present in a given pcap file. This can be done by looking for specific destination ports (9100, 631...)

About

A tool which can analyse stored network traffic from a pcap file, filter out print jobs and reverse them to ppm images.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages