The command line¶
Helps you find credentials and other interesting stuff in network captures.
usage: credslayer [-h] [-l INTERFACE] [-lo FILE] [-o FILE]
[-s {enable,disable}] [-f IP] [-m PORT:PROTOCOL] [--debug]
[pcapfiles [pcapfiles ...]]
Positional Arguments¶
- pcapfiles
pcap files you want to analyse
Named Arguments¶
- -l, --listen
start active processing on specified interface
- -lo, --listen-output
output captured packets to a pcap file
- -o, --output
output captured credentials to a file
- -s, --string-inspection
Possible choices: enable, disable
whether you want to look for interesting strings (email addresses, credit cards, …) or not (pretty heavy on the CPU, enabled by default on pcap files, disabled on live captures)
- -f, --filter
process packets involving the specified IP
- -m, --map
map a port to a protocol
- --debug
put CredSLayer and pyshark in debug mode
Default: False