Ubuntu 下用 Dumpcap 进行恶意软件流量分析
一 环境准备与权限配置
sudo apt update && sudo apt install -y wireshark tsharksudo usermod -aG wireshark $USERsudo setcap 'cap_net_raw,cap_net_admin=eip' /usr/bin/dumpcapip link 或 dumpcap -D,常见如 eth0、ens33、wlan0。二 捕获策略与常用命令
sudo dumpcap -i eth0 -w malware.pcapsudo dumpcap -i eth0 -f "udp port 53" -w dns_only.pcapsudo dumpcap -i eth0 -f "tcp port 80 or tcp port 443" -w web_only.pcapsudo dumpcap -i eth0 -w malware.pcap -a filesize:100000 -a files:10sudo dumpcap -i eth0 -w - | wireshark -r -sudo dumpcap -i eth0 -w - | tshark -r -三 恶意流量识别与分析流程
dns.qry.name contains "malicious" 或 dns.flags.response == 0http.request.uri contains "cmd"、http.user_agent contains "python-requests"ip.addr == <可疑IP>tls.handshake.extensions_server_name contains "bad" 或 tls.handshake.type == 1tshark -r malware.pcap -q -z dns,treetshark -r malware.pcap -Y "http.request" -q -z http,stat,1tshark -r malware.pcap -Y "http.request.uri contains 'cmd'" -T fields -e http.host -e http.request.uritshark -r malware.pcap -q -z endpoints,ip 与 -z conv,tcpsuricata -r malware.pcap -c /etc/suricata/suricata.yaml四 自动化与取证建议
dumpcap -i eth0 -w /data/cap/malware_$(date +%F_%H%M%S).pcap -a filesize:100000 -a files:20tshark -r $file -q -z dns,tree 与 tshark -r $file -Y "http.request" -q -z http,stat,1注意:本文仅用于合法的安全研究、授权测试与应急响应。对非授权目标进行网络监听、分析或任何可能危害系统安全的行为可能触犯法律。