Threat Level: green Handler on Duty: Xavier Mertens

SANS ISC: justniffer a Packet Analysis Tool SANS ISC InfoSec Forums

Participate: Learn more about our honeypot network

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
justniffer a Packet Analysis Tool

Are you looking for another packet sniffer? justniffer is a packet sniffer with some interesting features. According to the author, this packet sniffer can rebuild and save HTTP file content sent over the network. "It uses portions of Linux kernel source code for handling all TCP/IP stuff. Precisely, it uses a slightly modified version of the libnids libraries that already include a modified version of Linux code in a more reusable way."[1] The tarball can be downloaded here and a package is already available for Ubuntu.

The binary execution is pretty straightforward, you can capture/read of the wire or replay captured pcap files. This example (using -l option for custom log format) will output the Time, Destination IP, Website and URL:

justniffer -l "%request.timestamp %dest.ip %request.url" -f file.pcap

11/01/14 17:31:42 /select/wifiloginsuccess/EN/
11/01/14 13:08:45 /WebObjects/VCInit.woa/wa/getBag?ix=1
11/01/14 12:55:27 /s/droidserif/v6/0AKsP294HTD-nvJgucYTaOL2WfuF7Qc3ANwCvwl0TnA.woff2
11/01/14 12:55:26 /css?family=Droid+Serif:regular|Crimson+Text:italic

It also comes with a script justniffer-grab-http-traffic (a python script) that output the web content (html, javascript, images,etc) captured in the traffic to a directory. This is an example of running the python script against an interface, all the traffic gets saved in /tmp/web_traffic.

justniffer-grab-http-traffic -d /tmp/web_traffic -U nobody -i eth1

It can decode other protocols by reading them in "raw" format. For example, just reading an email without any options output the follow summary information:

root@sniffer:/tmp/justniffer -f mail_mime.pcap - - [-] "" 0 "" "" - - [29/Dec/2008:19:35:08 -0500] "HELO" 0 "" "" - - [29/Dec/2008:19:35:08 -0500] "MAIL FROM:" 2.1.0 0 "" "" - - [29/Dec/2008:19:35:08 -0500] "RCPT TO:" 2.1.5 0 "" "" - - [29/Dec/2008:19:35:08 -0500] "DATA" Enter 0 "" "" - - [29/Dec/2008:19:35:10 -0500] "Received: (qmail 5457 invoked by uid 60001); 30 Dec 2008 00:35:02 -0000" 2.0.0 0 "" "" - - [29/Dec/2008:19:35:10 -0500] "QUIT" 2.0.0 0 "" ""

Adding "raw" now to the output with -r and it decode the traffic in its entirety including dumping the raw base64 attachment:

root@sniffer:/tmp/justniffer -f mail_mime.pcap -r

220 ESMTP Sendmail 8.13.8+Sun/8.13.8; Mon, 29 Dec 2008 19:35:08 -0500 (EST)

250 Hello [], pleased to meet you

250 2.1.0 ... Sender ok

250 2.1.5 ... Recipient ok

354 Enter mail, end with "." on a line by itself


This is another tool alternative to capture and analyze traffic that can be added to your tool bag. Give it a try.



Guy Bruneau IPSS Inc. gbruneau at isc dot sans dot edu


511 Posts
ISC Handler
Nov 3rd 2014
I especially like the way that justniffer-grab-http-traffic uncompresses gzip-encoded web content, a feature that for me was quite hard to find in command line sniffing tools.

Sign Up for Free or Log In to start participating in the conversation!