Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Overview  





2 Features  



2.1  Software architecture  





2.2  Large scale pcap data analysis  





2.3  VoIP calls  







3 Basic commands working from command line  





4 Distributions  





5 See also  





6 References  





7 External links  














Xplico






Italiano
 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


Developer(s)Gianluca Costa & Andrea de Franceschi
Stable release

1.2.2 / May 2, 2019; 5 years ago (2019-05-02)[1]

Written inC, PHP, Python
Operating systemLinux
TypeNetwork Forensics
LicenseGNU General Public License
Websitewww.xplico.org

Xplico is a network forensics analysis tool (NFAT), which is a software that reconstructs the contents of acquisitions performed with a packet sniffer (e.g. Wireshark, tcpdump, Netsniff-ng).

Unlike the protocol analyzer, whose main characteristic is not the reconstruction of the data carried out by the protocols, Xplico was born expressly with the aim to reconstruct the protocol's application data and it is able to recognize the protocols with a technique named Port Independent Protocol Identification (PIPI).[2]

The name "xplico" refers to the Latin verb explico and its significance.

Xplico is free and open-source software, subject to the requirements of the GNU General Public License (GPL), version 2.[3]

Overview[edit]

Using raw data from EthernetorPPP of a web navigation (HTTP protocol), Xplico extracts application data and reconstructs the contents within a packet. In the case of HTTP protocol: images, files, or cookies would be extracted. Similarly Xplico is able to reconstruct the e-mail exchanged with the IMAP, POP, and SMTP protocols.

Among the protocols that Xplico identifies and reconstructs there are VoIP, MSN, IRC, HTTP, IMAP, POP, SMTP, and FTP.

Features[edit]

Software architecture[edit]

The Xplico's software architecture provides:

With the output module Xplico can have different user interfaces, in fact it can be used from command line and from a web user interface called "Xplico Interface". The protocol dissector is the modules for the decoding of the individual protocol, each protocol dissector can reconstruct and extract the data of the protocol.

All modules are plug-in and, through the configuration file, they can be loaded or not during execution of the program. This allows to focus the decoding, that is, if you want to decode only VoIP calls but not the Web traffic then you configure Xplico to load only the RTP and SIP modules excluding the HTTP module.[4]

Large scale pcap data analysis[edit]

Another feature of Xplico is its ability to process (reconstruct) huge amounts of data: it is able to manage pcap files of multiple gigabytes and even terabytes from multiple capture probes simultaneously. This is thanks to the use of various types of "input modules". The pcap files can be uploaded in many ways, directly from the Xplico Web user interface, with a SFTP or with a transmission channel called PCAP-over-IP.

For these features Xplico is used in the contexts of Lawful interception[5][6] and in Network Forensics.[7]

VoIP calls[edit]

Xplico and also its specific version called pcap2wav is able to decode VoIP calls based on the RTP protocol (SIP, H323, MGCP, SKINNY) and supports the decodidica of audio codecs G711ulaw, G711alaw, G722, G729, G723, G726, and MSRTA (Microsoft's Real-time audio).[8]

Basic commands working from command line[edit]

In these examples, it is assumed that eth0 is the used network interface.

xplico -m rltm -i eth0
xplico -m pcap -f example.pcap
xplico -m pcap -d /path/dir/

in all cases the data decoded are stored in the a directory named xdecode. With the parameter -m we can select the "input module" type. The input module named rltm acquires the data directly from the network interface, vice versa the input module named pcap acquires data form pcap files or directory.

Distributions[edit]

Xplico is installed by default in the major distributions of digital forensics and penetration testing:

See also[edit]

References[edit]

  1. ^ "Xplico – Xplico 1.2.2".
  • ^ "ISSA Journal" (PDF). Retrieved 2012-06-01.
  • ^ "Xplico License".
  • ^ Gabriele Faggioli, Andrea Ghirardini (2009). Computer Forensics. Italy: Apogeo. pp. 5, 227, 278, 369–370. ISBN 978-88-503-2816-1.
  • ^ "On detecting Internet-based criminal threats (European FP7-SEC Project INDECT)" (PDF). Retrieved 2017-05-09.
  • ^ Gacimartín García, Carlos (January 2009). "Sistema de interceptación y análisis de comunicaciones) |".
  • ^ Cameron H. Malin, Eoghan Casey BS MA (2012). Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides. ISBN 978-1597494724.
  • ^ pcap2wav Xplico interface http://www.xplico.org/archives/1287
  • ^ Kali, Xplico as a package.
  • ^ "Backtrack 5".
  • ^ "Projects DEFT Linux". Archived from the original on June 18, 2012.
  • ^ "Linux Forensics Tools Repository".
  • External links[edit]


    Retrieved from "https://en.wikipedia.org/w/index.php?title=Xplico&oldid=1204682163"

    Categories: 
    Free software programmed in C
    Network analyzers
    Free network management software
    Unix network-related software
    Linux-only free software
    Hidden categories: 
    Articles with short description
    Short description is different from Wikidata
    Official website different in Wikidata and Wikipedia
     



    This page was last edited on 7 February 2024, at 18:25 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki