xref: /dragonfly/contrib/file/magic/Magdir/sniffer (revision 9348a738)
1
2#------------------------------------------------------------------------------
3# $File: sniffer,v 1.19 2013/01/06 01:11:04 christos Exp $
4# sniffer:  file(1) magic for packet capture files
5#
6# From: guy@alum.mit.edu (Guy Harris)
7#
8
9#
10# Microsoft Network Monitor 1.x capture files.
11#
120	string		RTSS		NetMon capture file
13>5	byte		x		- version %d
14>4	byte		x		\b.%d
15>6	leshort		0		(Unknown)
16>6	leshort		1		(Ethernet)
17>6	leshort		2		(Token Ring)
18>6	leshort		3		(FDDI)
19>6	leshort		4		(ATM)
20>6	leshort		>4		(type %d)
21
22#
23# Microsoft Network Monitor 2.x capture files.
24#
250	string		GMBU		NetMon capture file
26>5	byte		x		- version %d
27>4	byte		x		\b.%d
28>6	leshort		0		(Unknown)
29>6	leshort		1		(Ethernet)
30>6	leshort		2		(Token Ring)
31>6	leshort		3		(FDDI)
32>6	leshort		4		(ATM)
33>6	leshort		5		(IP-over-IEEE 1394)
34>6	leshort		6		(802.11)
35>6	leshort		7		(Raw IP)
36>6	leshort		8		(Raw IP)
37>6	leshort		9		(Raw IP)
38>6	leshort		>9		(type %d)
39
40#
41# Network General Sniffer capture files.
42# Sorry, make that "Network Associates Sniffer capture files."
43# Sorry, make that "Network General old DOS Sniffer capture files."
44#
450	string		TRSNIFF\ data\ \ \ \ \032	Sniffer capture file
46>33	byte		2		(compressed)
47>23	leshort		x		- version %d
48>25	leshort		x		\b.%d
49>32	byte		0		(Token Ring)
50>32	byte		1		(Ethernet)
51>32	byte		2		(ARCNET)
52>32	byte		3		(StarLAN)
53>32	byte		4		(PC Network broadband)
54>32	byte		5		(LocalTalk)
55>32	byte		6		(Znet)
56>32	byte		7		(Internetwork Analyzer)
57>32	byte		9		(FDDI)
58>32	byte		10		(ATM)
59
60#
61# Cinco Networks NetXRay capture files.
62# Sorry, make that "Network General Sniffer Basic capture files."
63# Sorry, make that "Network Associates Sniffer Basic capture files."
64# Sorry, make that "Network Associates Sniffer Basic, and Windows
65# Sniffer Pro", capture files."
66# Sorry, make that "Network General Sniffer capture files."
67# Sorry, make that "NetScout Sniffer capture files."
68#
690	string		XCP\0		NetXRay capture file
70>4	string		>\0		- version %s
71>44	leshort		0		(Ethernet)
72>44	leshort		1		(Token Ring)
73>44	leshort		2		(FDDI)
74>44	leshort		3		(WAN)
75>44	leshort		8		(ATM)
76>44	leshort		9		(802.11)
77
78#
79# "libpcap" capture files.
80# (We call them "tcpdump capture file(s)" for now, as "tcpdump" is
81# the main program that uses that format, but there are other programs
82# that use "libpcap", or that use the same capture file format.)
83#
840	name		pcap-be
85>4	beshort		x		- version %d
86>6	beshort		x		\b.%d
87>20	belong		0		(No link-layer encapsulation
88>20	belong		1		(Ethernet
89>20	belong		2		(3Mb Ethernet
90>20	belong		3		(AX.25
91>20	belong		4		(ProNET
92>20	belong		5		(CHAOS
93>20	belong		6		(Token Ring
94>20	belong		7		(BSD ARCNET
95>20	belong		8		(SLIP
96>20	belong		9		(PPP
97>20	belong		10		(FDDI
98>20	belong		11		(RFC 1483 ATM
99>20	belong		12		(raw IP
100>20	belong		13		(BSD/OS SLIP
101>20	belong		14		(BSD/OS PPP
102>20	belong		19		(Linux ATM Classical IP
103>20	belong		50		(PPP or Cisco HDLC
104>20	belong		51		(PPP-over-Ethernet
105>20	belong		99		(Symantec Enterprise Firewall
106>20	belong		100		(RFC 1483 ATM
107>20	belong		101		(raw IP
108>20	belong		102		(BSD/OS SLIP
109>20	belong		103		(BSD/OS PPP
110>20	belong		104		(BSD/OS Cisco HDLC
111>20	belong		105		(802.11
112>20	belong		106		(Linux Classical IP over ATM
113>20	belong		107		(Frame Relay
114>20	belong		108		(OpenBSD loopback
115>20	belong		109		(OpenBSD IPsec encrypted
116>20	belong		112		(Cisco HDLC
117>20	belong		113		(Linux "cooked"
118>20	belong		114		(LocalTalk
119>20	belong		117		(OpenBSD PFLOG
120>20	belong		119		(802.11 with Prism header
121>20	belong		122		(RFC 2625 IP over Fibre Channel
122>20	belong		123		(SunATM
123>20	belong		127		(802.11 with radiotap header
124>20	belong		129		(Linux ARCNET
125>20	belong		138		(Apple IP over IEEE 1394
126>20	belong		139		(MTP2 with pseudo-header
127>20	belong		140		(MTP2
128>20	belong		141		(MTP3
129>20	belong		142		(SCCP
130>20	belong		143		(DOCSIS
131>20	belong		144		(IrDA
132>20	belong		147		(Private use 0
133>20	belong		148		(Private use 1
134>20	belong		149		(Private use 2
135>20	belong		150		(Private use 3
136>20	belong		151		(Private use 4
137>20	belong		152		(Private use 5
138>20	belong		153		(Private use 6
139>20	belong		154		(Private use 7
140>20	belong		155		(Private use 8
141>20	belong		156		(Private use 9
142>20	belong		157		(Private use 10
143>20	belong		158		(Private use 11
144>20	belong		159		(Private use 12
145>20	belong		160		(Private use 13
146>20	belong		161		(Private use 14
147>20	belong		162		(Private use 15
148>20	belong		163		(802.11 with AVS header
149>20	belong		165		(BACnet MS/TP
150>20	belong		166		(PPPD
151>20	belong		169		(GPRS LLC
152>20	belong		177		(Linux LAPD
153>20	belong		187		(Bluetooth HCI H4
154>20	belong		189		(Linux USB
155>20	belong		192		(PPI
156>20	belong		195		(802.15.4
157>20	belong		196		(SITA
158>20	belong		197		(Endace ERF
159>20	belong		201		(Bluetooth HCI H4 with pseudo-header
160>20	belong		202		(AX.25 with KISS header
161>20	belong		203		(LAPD
162>20	belong		204		(PPP with direction pseudo-header
163>20	belong		205		(Cisco HDLC with direction pseudo-header
164>20	belong		206		(Frame Relay with direction pseudo-header
165>20	belong		209		(Linux IPMB
166>20	belong		215		(802.15.4 with non-ASK PHY header
167>20	belong		220		(Memory-mapped Linux USB
168>20	belong		224		(Fibre Channel FC-2
169>20	belong		225		(Fibre Channel FC-2 with frame delimiters
170>20	belong		226		(Solaris IPNET
171>20	belong		227		(SocketCAN
172>20	belong		228		(Raw IPv4
173>20	belong		229		(Raw IPv6
174>20	belong		230		(802.15.4 without FCS
175>20	belong		231		(D-Bus messages
176>20	belong		235		(DVB-CI
177>20	belong		236		(MUX27010
178>20	belong		237		(STANAG 5066 D_PDUs
179>20	belong		239		(Linux netlink NFLOG messages
180>20	belong		240		(Hilscher netAnalyzer
181>20	belong		241		(Hilscher netAnalyzer with delimiters
182>20	belong		242		(IP-over-Infiniband
183>20	belong		243		(MPEG-2 Transport Stream packets
184>20	belong		244		(ng4t ng40
185>20	belong		245		(NFC LLCP
186>20	belong		247		(Infiniband
187>20	belong		248		(SCTP
188>16	belong		x		\b, capture length %d)
189
1900	ubelong		0xa1b2c3d4	tcpdump capture file (big-endian)
191!:mime	application/vnd.tcpdump.pcap
192>0	use	pcap-be
1930	ulelong		0xa1b2c3d4	tcpdump capture file (little-endian)
194!:mime	application/vnd.tcpdump.pcap
195>0	use	\^pcap-be
196
197#
198# "libpcap"-with-Alexey-Kuznetsov's-patches capture files.
199# (We call them "tcpdump capture file(s)" for now, as "tcpdump" is
200# the main program that uses that format, but there are other programs
201# that use "libpcap", or that use the same capture file format.)
202#
2030	ubelong		0xa1b2cd34	extended tcpdump capture file (big-endian)
204>0	use	pcap-be
2050	ulelong		0xa1b2cd34	extended tcpdump capture file (little-endian)
206>0	use	\^pcap-be
207
208#
209# "pcap-ng" capture files.
210# http://www.winpcap.org/ntar/draft/PCAP-DumpFileFormat.html
211# Pcap-ng files can contain multiple sections. Printing the endianness,
212# snaplen, or other information from the first SHB may be misleading.
213#
2140	ubelong		0x0a0d0d0a
215>8	ubelong		0x1a2b3c4d	pcap-ng capture file
216>>12	beshort		x		- version %d
217>>14	beshort		x		\b.%d
2180	ulelong		0x0a0d0d0a
219>8	ulelong		0x1a2b3c4d	pcap-ng capture file
220>>12	leshort		x		- version %d
221>>14	leshort		x		\b.%d
222
223#
224# AIX "iptrace" capture files.
225#
2260	string		iptrace\ 1.0	"iptrace" capture file
2270	string		iptrace\ 2.0	"iptrace" capture file
228
229#
230# Novell LANalyzer capture files.
231#
2320	leshort		0x1001		LANalyzer capture file
2330	leshort		0x1007		LANalyzer capture file
234
235#
236# HP-UX "nettl" capture files.
237#
2380	string		\x54\x52\x00\x64\x00	"nettl" capture file
239
240#
241# RADCOM WAN/LAN Analyzer capture files.
242#
2430	string		\x42\xd2\x00\x34\x12\x66\x22\x88	RADCOM WAN/LAN Analyzer capture file
244
245#
246# NetStumbler log files.  Not really packets, per se, but about as
247# close as you can get.  These are log files from NetStumbler, a
248# Windows program, that scans for 802.11b networks.
249#
2500	string		NetS		NetStumbler log file
251>8	lelong		x		\b, %d stations found
252
253#
254# *Peek tagged capture files.
255#
2560	string		\177ver		EtherPeek/AiroPeek/OmniPeek capture file
257
258#
259# Visual Networks traffic capture files.
260#
2610	string		\x05VNF		Visual Networks traffic capture file
262
263#
264# Network Instruments Observer capture files.
265#
2660	string		ObserverPktBuffe	Network Instruments Observer capture file
267
268#
269# Files from Accellent Group's 5View products.
270#
2710	string		\xaa\xaa\xaa\xaa	5View capture file
272