Extracting/Dissecting Protocol/Layer information #526
Unanswered
causalloop
asked this question in
Q&A
Replies: 1 comment 1 reply
-
Does the pcap look the same way when you load it into Wireshark? I assume there is a way to get tshark to do a 'decode as' as well, but I'm no expert. Hope that helps. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I'm not an expert in pretty much anything, so bare with me here...
We've got an old script from python 2.7 that I'm trying to update to 3.x because the author refuses to do it. Its purpose is to basically look at the stream from a camera and make sure that various things work correctly - thats the short version. Jumping ahead a bit, when I look at the pcap in wireshark, the info I need is from the UDP packet is in the H.264 Layer/Protocol (I'm not sure what the right word is). I can see it fine in wireshark, and if I only needed to look at one packet, that'd be the end of it, but I have to do run this script for 2 minutes at all the different resolutions a particular camera can do.
So. using pyshark and tshark, I can get 4 layers that actually have information I can do something with (except that I don't actually need them...), those layers are, ETH, IP, UDP and RTP. The remaining layers show up as "DATADATA".
I can upload some of the info, but it gets tricky because we're working with stuff that hasn't been released yet and I don't know what I can and can't share... I did upload a screen shot of some of the data we're using - basically as an identifier for the other information in the packet, i.e., if it has this, then look at some timing info etc. I know it's not much to go on, but I've spent too long on it already (I need to learn to fail faster...)
Any thoughts on how I can turn "DATADATA" into something useful...?
This is what I see in the output:
Beta Was this translation helpful? Give feedback.
All reactions