____ _ _ _ _
_ __ ___ __ _ _ __|___ \ _ __ _ __(_)_ __ | |_ (_) ___ | |__
| '_ \ / __/ _` | '_ \ __) | '_ \| '__| | '_ \| __|| |/ _ \| '_ \
| |_) | (_| (_| | |_) / __/| |_) | | | | | | | |_ | | (_) | |_) |
| .__/ \___\__,_| .__/_____| .__/|_| |_|_| |_|\__|/ |\___/|_.__/
|_| |_| |_| |__/
pcap2printjob by mightychoc
github.com/mightychoc/pcap2printjob
pcap2printjob
is a tool for reversing print jobs from captured network traffic. It currently supports unencrypted CUPS IPP 2.0 traffic, but it is planed to extend the tool for other printing protocols in the future.
- Scapy - Python library for packet manipulation
- ppm2pwg - Open source PWG/URF to Netpbm converter
- Wireshark / tshark - Network protocol analyser
-
pcap2printjob
cannot parse the job-attributes media struct in the IPP create-job request. Hence we simply skip this information at the moment... - Unknown what happens to the program, if the TCP-footer is not empty
- There are other possible tags which IPP can set according to the specification. Unclear how we can handle this due to lack of testing data.
- Use multithreading to process multiple pcap files / multiple jobs in a pcap file in parallel.
- "Magic mode" to identify which protocols might even be present in a given pcap file. This can be done by looking for specific destination ports (9100, 631...)