I have a raw data file - not text - not formatted in any way. It appears to be packet based, as i see continue flags - 7E - with by bursts of activity in between. How can i import this into wireshark? asked 14 May '16, 11:57 jcss7 |
2 Answers:
You'll need to write code for Wireshark's libwiretap to recognize and read it. As it's your program, you know what the format is. answered 14 May '16, 12:24 Guy Harris ♦♦ edited 14 May '16, 23:40 Sounds like an ISDN S/T interface trace of the LAPD protocol. (14 May '16, 13:23) Jaap ♦ See also, High-Level Data Link Control. (14 May '16, 19:58) cmaynard ♦♦ I was handling a similar scenario, extraction of LAPD from an E1 timeslot, and ended up extracting the PDUs and writing them in pcap or pcapng format. As I am a "non-dev", i.e. I don't speack C fluently and haven't rolled out the development environment necessary to write binary Wireshark plugins, I've used perl to code the whole thing, from reading from the E1 to generating the pcap(ng) stream. As by then (and maybe until now?) Wireshark couldn't read pcapng from a pipe, I had to choose between the ability to run live capture and the ability to provide packet metadata (direction and L1 errors), so I've chosen the second. Important points:
(15 May '16, 01:22) sindy thanks. it is LAPD and i see the long strings of 7E FC, and EF. i'll give it a try (15 May '16, 07:26) jcss7 |
i wound up resurrecting some old code and parsed the data. it is in fact HDLC/LAPD with supervisory and information messages. answered 15 May '16, 00:44 jcss7 |
So where did you get that file? What program produced it?
My own program for E1 monitoring. so all 31 timeslots appear to be one bonded IP stream.