Ubuntu 下用 Dumpcap 捕获并分析恶意软件流量的实操指南
一、环境与权限准备
sudo apt update && sudo apt install -y wireshark tsharksudo setcap 'cap_net_raw,cap_net_admin=eip' /usr/bin/dumpcapsudo usermod -aG wireshark $USER二、捕获策略与命令示例
sudo dumpcap -i eth0 -w capture.pcapsudo dumpcap -i any -w malware.pcap -a filesize:100 -a files:10sudo dumpcap -i any -f "udp port 53" -w dns_only.pcapsudo dumpcap -i any -f "tcp port 80 or tcp port 443" -w web_only.pcapip.addr == 192.168.1.100、dns.qry.name contains "malicious"、http.host contains "bad.domain"sudo dumpcap -i any -w - | wireshark -r --s 0(抓取完整帧)、-B 1048576(增大缓冲区,单位 KB)、-v(更详细输出)。三、恶意流量识别与分析步骤
wireshark capture.pcapip.addr == <可疑IP>、dns.qry.name contains "<关键词>"、http.host contains "<可疑域名>"tshark -r capture.pcap -q -z conv,tcptshark -r capture.pcap -Y "dns" -T fields -e dns.qry.name -e dns.atshark -r capture.pcap -Y "http" -T fields -e http.host -e http.user_agent | sort -usuricata -r capture.pcap -c /etc/suricata/suricata.yamlcat /var/log/suricata/fast.log 或 suricata -c /etc/suricata/suricata.yaml --list-rules | grep -i <关键词>四、隔离与合规操作
五、快速命令清单
sudo apt update && sudo apt install -y wireshark tsharksudo setcap 'cap_net_raw,cap_net_admin=eip' /usr/bin/dumpcapsudo dumpcap -i any -w malware.pcap -a filesize:100 -a files:10sudo dumpcap -i any -f "udp port 53" -w dns_only.pcapsudo dumpcap -i any -w - | wireshark -r -ip.addr == 192.168.1.100、dns.qry.name contains "malicious"tshark -r capture.pcap -q -z conv,tcpsuricata -r capture.pcap -c /etc/suricata/suricata.yaml