-
-
Notifications
You must be signed in to change notification settings - Fork 333
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Extremely slow processing of pcap files #51
Comments
Hi @nuschpl ! Thanks for letting me know. If you used BruteSharkCli it is It makes sense that the run time was long since it is reconstructing all the TCP / UDP sessions by default. Unfortunately the user-interface is currently does not provide the required capabilities for use a configuration that is appropriate for a particular analysis.. (let's say in your case it is enough to run only the hashes module without building sessions). BruteSharkDesktop although provide this capabilities (see picture attached), you may prefer to use it for the pcap you described. In the near future we plan to make significant refactor that will also allow BruteSharkCli to run as a single command line with all the options that the tool provides (this will also solve the other issue that you have opened). We are welcome contributors, feel free to suggest a design for BruteSharkCli or even implement it. |
Hi, I'm not sure sacrificing some functionality (reconstructing sessions in this case) is the only solution if current implementation is slow. I have at least two suggestions:
|
It's definitely not the only solution, but a trivial one (and useful for the general user experience as well). |
there's a branch in this repo in which i'm trying to overcome this issue, that a look if you want to :) a little glimpse to what i've already accomplished; Brute.Shark.15_12_2020.19_51_54.mp4 |
BruteSharkCli now has two modes: single command and shell mode. The single command mode works by getting all the relevant parameters for the processing and then printing the results to stdout or files. The shell mode allows to perform each step individually. You can just set the credentials module and configure an output directory and all your hashes will be exported automatically. Example Video: https://youtu.be/GjGV5vwIGi8 Please see the 'Usage' section for detailed documentation and examples. |
I used to process ~15GB pcap files with https://github.com/lgandx/PCredz and I believed it's slow and not optimal tool. But BruteShark comparing to it is extremely slow. Filtering 15GB pcap with wireshark for NTLMSSP packets takes less than a minute on my 16core, 32GB hardware, it results in 3MB file which is processed by BruteShark almost the same ammount of time - something is not optimal here. I've found it utilizes only 1 CPU core and use limited amount of RAM for processing, is there any prefered way to implement threads and caching here ? I can contribute
The text was updated successfully, but these errors were encountered: