• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Chaosreader – Trace TCP/UDP Sessions from tcpdump

November 28, 2007

Views: 27,181

[ad]

A freeware tool to trace TCP/UDP sessions and fetch application data from snoop or tcpdump logs. This is a type of “any-snarf” program, as it will fetch telnet sessions, FTP files, HTTP transfers (HTML, GIF, JPEG), SMTP emails and so on from the captured data inside network traffic logs.

Similar to tcpflow which we mentioned recently.

A html index file is created that links to all the session details, including realtime replay programs for telnet, rlogin, IRC, X11 and VNC sessions; and reports such as image reports and HTTP GET/POST content reports. Chaosreader can also run in standalone mode – where it invokes tcpdump or snoop (if they are available) to create the log files and then processes them.

The cool thing about Chaosreader is that it outputs a nicely formatted HTML file to enable you to look at the extracted sessions a lot easier.

In this example, a snoop file was created while a website was loaded, telnet was used to login and ftp to transfer files. Chaosreader has managed to extract the HTTP sections, follow the telnet session, grab the FTP files, and create an Image Report from the snoop log. It has also created a replay program to playback the telnet session. You can see the example here.

You can find some more screenshots here.

You can download Chaosreader here:

Chaosreader 0.94

You can read more here.

Related Posts:

  • HTTrack - Website Downloader Copier & Site Ripper Download
  • An Introduction To Web Application Security Systems
  • EtherApe - Graphical Network Monitor
  • dsniff Download - Tools for Network Auditing &…
  • Ettercap - A Suite For Man-In-The-Middle Attacks
  • Upload_Bypass - Bypass Upload Restrictions During…
Share
Tweet
Share
Buffer
WhatsApp
Email
0 Shares

Filed Under: Forensics, Hacking Tools, Networking Hacking Tools Tagged With: Network Hacking, network-analysis, network-forensics



Reader Interactions

Comments

  1. dirty says

    November 28, 2007 at 8:43 am

    Cool…I like how you can easily view the webpages and images that victim, i mean end-user, has seen. I wonder what interesting pics you can capture with this. How do the replay files work? Im either up way to late(NYC) or you (darknet) are up way too early.

    Dont think i will have any free time to mess with this tomorrow but Ill check back for other’s comments.

  2. Reticent says

    November 28, 2007 at 11:44 pm

    Awesome, looks like something worth checking out. I’ve just recently been playing with urlsnarf which is part of the hping suite of tools. It’s good but doesn’t sound as fully featured as this one.

    I’m interested to know how big those html files blow out on a busy network – I can imagine you’d end up with a pretty chunky html file even with 30mins browsing a semi image intensive site, ebay for example.

  3. Darknet says

    November 29, 2007 at 6:26 am

    dirty: I live in Asia actually (GMT+8) so I normally post in the afternoon here so it’s up early morning stateside.

  4. Goodpeople says

    November 30, 2007 at 11:42 am

    This is fun. My students wille be going nuts if I show them this.. :-)

  5. File sniffer says

    November 30, 2007 at 11:52 am

    If you want to have a Windows application that can extract and store files sent with HTTP, SMB or TFTP then I would suggest using NetworkMiner. The application NetworkMiner is free and available as open source at SourceForge.

    See:
    http://sourceforge.net/projects/networkminer/

  6. Sir Henry says

    December 14, 2007 at 5:58 pm

    This is something that I should run on any of the “open” networks in my area to see just what skeletons are in the closets of those around whom I am located. This, too, is something I will have to add to my list of toys with which to play.

  7. Sigu says

    March 5, 2008 at 11:54 am

    Another tool similar to Chaosreader is xplico ( http://www.xplico.org )

  8. Pantagruel says

    March 5, 2008 at 12:14 pm

    You could try curl but like chaosreader it requires a UNIX shell and Perl interpreter. Not all users/admins have shell access to a UNIX system, or are unable to install a Perl interpreter on their desktop.
    If so you could use the Firefox live headers plug-in to debug web-based app’s.

    Find it at:
    http://livehttpheaders.mozdev.org/

    Xplico is part of the DEFT ((acronym of “Digital Evidence & Forensic Toolkit)) distribution (http://deft.yourside.it/).

    @Darknet one to add to the list of toolkit distro’s

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Defending Against Malicious Botnets in 2025 Automated Traffic Threats and Mitigation

Defending Against Malicious Botnets in 2025 Automated Traffic Threats and Mitigation

Views: 154

Automated internet traffic will now overtake human activity, presenting sophisticated cyber threats … ...More about Defending Against Malicious Botnets in 2025 Automated Traffic Threats and Mitigation

TREVORspray - Credential Spray Toolkit for Azure, Okta, OWA & More

TREVORspray – Credential Spray Toolkit for Azure, Okta, OWA & More

Views: 323

TREVORspray is a purpose-built password spraying utility designed for red teams and offensive … ...More about TREVORspray – Credential Spray Toolkit for Azure, Okta, OWA & More

Force Push Scanner - Hunt GitHub Dangling Commits for Leaked Secrets

Force Push Scanner – Hunt GitHub Dangling Commits for Leaked Secrets

Views: 337

Force Push Scanner is an offensive security tool that identifies secrets inadvertently left in … ...More about Force Push Scanner – Hunt GitHub Dangling Commits for Leaked Secrets

Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends

Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends

Views: 5,109

Darknet marketplaces remain central to illicit trade in 2025, with evolving business models, payment … ...More about Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends

Caracal - Rust eBPF Rootkit for Stealthy Post-Exploitation

Caracal – Rust eBPF Rootkit for Stealthy Post-Exploitation

Views: 514

Caracal is a new Rust-based eBPF (extended Berkeley Packet Filter) rootkit that provides a stealth … ...More about Caracal – Rust eBPF Rootkit for Stealthy Post-Exploitation

Windows_EndPoint_Audit - Endpoint Security Auditing Toolkit

Windows_EndPoint_Audit – Endpoint Security Auditing Toolkit

Views: 569

Windows_EndPoint_Audit from ITAuditMaverick introduces a powerful method for offensive security … ...More about Windows_EndPoint_Audit – Endpoint Security Auditing Toolkit

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (2)
  • Countermeasures (231)
  • Cryptography (84)
  • Dark Web (1)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (432)
  • Forensics (65)
  • GenAI (4)
  • Hacker Culture (9)
  • Hacking News (231)
  • Hacking Tools (688)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (240)
  • Networking Hacking Tools (353)
  • Password Cracking Tools (105)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (236)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (170)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,333,540)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,356)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,838)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,812)
  • Password List Download Best Word List – Most Common Passwords (933,802)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,473)
  • Hack Tools/Exploits (673,477)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,460)

Search

Recent Posts

  • Defending Against Malicious Botnets in 2025 Automated Traffic Threats and Mitigation July 16, 2025
  • TREVORspray – Credential Spray Toolkit for Azure, Okta, OWA & More July 14, 2025
  • Force Push Scanner – Hunt GitHub Dangling Commits for Leaked Secrets July 11, 2025
  • Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends July 9, 2025
  • Caracal – Rust eBPF Rootkit for Stealthy Post-Exploitation July 7, 2025
  • Windows_EndPoint_Audit – Endpoint Security Auditing Toolkit July 4, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy