I don't see any code posted for these two tools, but you may want to
contact the people involved:
http://www-nrg.ee.lbl.gov/LBNL-FTP-ANON.html
http://www.ece.gatech.edu/research/labs/nsa/honeynet/tools/pcap-anon.shtml

Obviously any tool has it's limits and what is considered public
information to one person is confidential to another.

-- 
Aaron Turner
http://synfin.net/
http://tcpreplay.synfin.net/ - Pcap editing & replay tools for Unix



On 2/11/07, [Chris] NULL <[EMAIL PROTECTED]> wrote:
> Thanks lot for your answer. Packet trace anonymization was exactly the point
> I am interested in :)
>
> Regards,
> Chris
>
> > > My question is, is it possible to use the Wireshark disectors to "build"
> >a
> > > trace. What I mean with this is, is it e.q. possible to change values in
> >the
> > > Wireshark GUI and then have Wireshark build the binary trace together? I
> > > know that in the current version this is not possible, but my question
> >is in
> > > general. Is it possible to extend the Wireshark disectors to be able to
> > > "build" a trace?
> >
> >No; that feature's missing from the current version because the
> >infrastructure for it isn't available, not because Wireshark chooses not
> >to implement it.
> >
> >This is probably significantly more complicated than one might think,
> >especially given packet reassembly.  A mechanism to do that would be
> >useful for manually editing packets (e.g., to construct a sequence of
> >packets to replay), as well as for the anonymization feature another
> >person would like to implement - but it'd require architectural work.
_______________________________________________
Wireshark-dev mailing list
[email protected]
http://www.wireshark.org/mailman/listinfo/wireshark-dev

Reply via email to