Tuesday, May 6, 2025
HomeForensics ToolsPcapXray - GUI Network Forensics Tool To Analysis a Packet Capture Offline

PcapXray – GUI Network Forensics Tool To Analysis a Packet Capture Offline

Published on

SIEM as a Service

Follow Us on Google News

Network Forensics Tool is often used by security professionals to test the vulnerabilities in the network. With this kali Linux tutorial, we introduce a Comprehensive tool PcapXray to analyze the pcap file.

The tool plots hosts in the network, network traffic, highlight important traffic and Tor traffic as well as potentially malicious traffic.

The tool contains the following components

- Advertisement - Google News
  • Network Diagram.
  • Device/Traffic Details and Analysis.
  • Malicious Traffic Identification.
  • Tor Traffic
  • GUI – a GUI with options to upload pcap file

Tutorial – Network Forensics Tool 

The packet capture tool can be called from GitHub. The tool gives security officials an initial glitch for investigation.

git clone https://github.com/Srinivas11789/PcapXray.git

cd PcapXray

To install the requirements: pip install -r requirements.txt

To Run : python Source/main.py

It will launch a graphical user interface and ask to locate the pcap file.

For demonstration, we have used the Netflix phishing campaign’s pcap file, with this tool we can extract the web traffic, Tor traffic, Malicious traffic, and other traffic details.

The analysis takes some time, and after that, we get a detailed report on communication, Device, and Packet details.

Network Forensics Tool
Network Forensics Tool
Network Forensics Tool

The location URL detected a Netflix Phishing page.

Network Forensics Tool

And the Destination IP 98[.]209[.]70[.]101 is not resolvable at the time of our analysis, looks like the campaign already ended.

The tool includes the following Python libraries

Scapy – rdpcap to read the packets from the pcap file
Ipwhois – to obtain whois information from ip
Netaddr – to check ip information type
Pillow – image processing library
Stem – tor consensus data fetch library
pyGraphviz – plot graph
Networkx – plot graph
Matplotlib – plot graph

Demo:

Author Credits Srinivas P G Github.

You can follow us on LinkedinTwitter, and Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

BFDOOR Malware Targets Organizations to Establish Long-Term Persistence

The BPFDoor malware has emerged as a significant threat targeting domestic and international organizations,...

Uncovering the Security Risks of Data Exposure in AI-Powered Tools like Snowflake’s CORTEX

As artificial intelligence continues to reshape the technological landscape, tools like Snowflake’s CORTEX Search...

UNC3944 Hackers Shift from SIM Swapping to Ransomware and Data Extortion

UNC3944, a financially-motivated threat actor also linked to the group known as Scattered Spider,...

Over 2,800 Hacked Websites Targeting MacOS Users with AMOS Stealer Malware

Cybersecurity researcher has uncovered a massive malware campaign targeting MacOS users through approximately 2,800...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Best SIEM Tools List For SOC Team – 2025

The Best SIEM tools for you will depend on your specific requirements, budget, and...

Live Forensic Techniques To Detect Ransomware Infection On Linux Machines

Ransomware, initially a Windows threat, now targets Linux systems, endangering IoT ecosystems. Linux ransomware...