iotnet
Compare original and translation side by side
🇺🇸
Original
English🇨🇳
Translation
ChineseIoTNet - IoT Network Traffic Analyzer
IoTNet - IoT网络流量分析器
You are helping the user analyze network traffic to detect IoT protocols and identify security vulnerabilities using the iotnet tool.
你将协助用户使用iotnet工具分析网络流量,检测IoT协议并识别安全漏洞。
Tool Overview
工具概述
IoTNet analyzes network packet captures (PCAPs) or performs live traffic capture to:
- Detect IoT-specific protocols (MQTT, CoAP, Zigbee, etc.)
- Identify security vulnerabilities in network traffic
- Analyze protocol distribution
- Find unencrypted communications
- Detect weak authentication mechanisms
- Identify insecure IoT device behaviors
IoTNet可分析网络数据包捕获文件(PCAP)或执行实时流量捕获,以实现:
- 检测IoT专属协议(MQTT、CoAP、Zigbee等)
- 识别网络流量中的安全漏洞
- 分析协议分布情况
- 查找未加密通信
- 检测弱认证机制
- 识别不安全的IoT设备行为
Instructions
操作说明
When the user asks to analyze network traffic, capture IoT traffic, or assess network security:
-
Determine input type:
- PCAP file analysis (offline)
- Live network capture (requires interface)
-
Gather requirements:
- For PCAP: Get file path(s)
- For live capture: Get network interface name and duration
- Ask about filtering needs (specific IPs, protocols)
- Check if custom detection rules are needed
-
Execute the analysis:
- Use the iotnet command from the iothackbot bin directory
当用户要求分析网络流量、捕获IoT流量或评估网络安全性时:
-
确定输入类型:
- PCAP文件分析(离线模式)
- 实时网络捕获(需要指定网络接口)
-
收集需求信息:
- 对于PCAP分析:获取文件路径
- 对于实时捕获:获取网络接口名称和捕获时长
- 询问是否需要过滤(特定IP、协议)
- 确认是否需要自定义检测规则
-
执行分析:
- 从iothackbot的bin目录调用iotnet命令
Usage Modes
使用模式
PCAP Analysis (Offline)
PCAP分析(离线)
Analyze one or more existing packet capture files:
bash
iotnet capture1.pcap capture2.pcap分析一个或多个已有的数据包捕获文件:
bash
iotnet capture1.pcap capture2.pcapLive Capture
实时捕获
Capture and analyze traffic in real-time:
bash
sudo iotnet -i eth0 -d 30实时捕获并分析流量:
bash
sudo iotnet -i eth0 -d 30Parameters
参数说明
Input Options:
- : One or more PCAP files to analyze
pcap_files - : Network interface for live capture
-i, --interface
Filtering Options:
- : Filter traffic by IP address
--ip - : BPF syntax filter for live capture
-c, --capture-filter - : Wireshark display filter for PCAP analysis
--display-filter
Live Capture Options:
- : Capture duration in seconds (default: 30)
-d, --duration
Analysis Options:
- : Custom IoT detection rules configuration file
--config- Default: in the iothackbot directory
config/iot/detection_rules.json
- Default:
Output Options:
- : Output format (default: text)
--format text|json|quiet - : Detailed output
-v, --verbose
输入选项:
- : 待分析的一个或多个PCAP文件
pcap_files - : 用于实时捕获的网络接口
-i, --interface
过滤选项:
- : 按IP地址过滤流量
--ip - : 实时捕获时使用BPF语法过滤器
-c, --capture-filter - : PCAP分析时使用Wireshark显示过滤器
--display-filter
实时捕获选项:
- : 捕获时长(单位:秒,默认值:30)
-d, --duration
分析选项:
- : 自定义IoT检测规则配置文件
--config- 默认路径:iothackbot目录下的
config/iot/detection_rules.json
- 默认路径:iothackbot目录下的
输出选项:
- : 输出格式(默认值:text)
--format text|json|quiet - : 输出详细信息
-v, --verbose
Examples
使用示例
Analyze a packet capture file:
bash
iotnet /path/to/capture.pcapLive capture for 60 seconds on wifi interface:
bash
sudo iotnet -i wlan0 -d 60Analyze traffic for specific IP:
bash
iotnet capture.pcap --ip 192.168.1.100Live capture with BPF filter:
bash
sudo iotnet -i eth0 -c "port 1883 or port 5683" -d 45Multiple PCAPs with custom config:
bash
iotnet file1.pcap file2.pcap --config custom-rules.jsonFilter by display filter (Wireshark syntax):
bash
iotnet capture.pcap --display-filter "mqtt or coap"分析数据包捕获文件:
bash
iotnet /path/to/capture.pcap在wifi接口上实时捕获60秒:
bash
sudo iotnet -i wlan0 -d 60分析特定IP的流量:
bash
iotnet capture.pcap --ip 192.168.1.100使用BPF过滤器进行实时捕获:
bash
sudo iotnet -i eth0 -c "port 1883 or port 5683" -d 45使用自定义规则分析多个PCAP文件:
bash
iotnet file1.pcap file2.pcap --config custom-rules.json使用显示过滤器(Wireshark语法)过滤:
bash
iotnet capture.pcap --display-filter "mqtt or coap"Detected IoT Protocols
可检测的IoT协议
The tool can identify:
- MQTT: Message Queue Telemetry Transport
- CoAP: Constrained Application Protocol
- Zigbee: Low-power mesh networking
- Z-Wave: Home automation protocol
- ONVIF: IP camera protocol
- UPnP/SSDP: Universal Plug and Play
- Modbus: Industrial control protocol
- And many more (configurable)
该工具可识别以下协议:
- MQTT: 消息队列遥测传输协议
- CoAP: 受限应用协议
- Zigbee: 低功耗网状网络协议
- Z-Wave: 家庭自动化协议
- ONVIF: IP摄像头协议
- UPnP/SSDP: 通用即插即用协议
- Modbus: 工业控制协议
- 以及更多可配置的协议
Security Checks
安全检测项
IoTNet identifies vulnerabilities such as:
- Unencrypted MQTT traffic
- Missing TLS/encryption
- Weak or no authentication
- Plaintext credentials
- Insecure protocol versions
- Known vulnerable implementations
IoTNet可识别以下类型的漏洞:
- 未加密的MQTT流量
- 缺失TLS/加密机制
- 弱认证或无认证
- 明文凭证
- 不安全的协议版本
- 已知存在漏洞的实现
Output Information
输出信息
Results include:
- Total packets analyzed
- Protocol distribution with percentages
- IoT findings with protocol details and packet info
- Vulnerabilities with severity levels (high/medium/low)
- Recommendations for remediation
分析结果包含:
- 分析的数据包总数
- 协议分布占比
- IoT检测结果,包含协议详情和数据包信息
- 漏洞信息,附带风险等级(高/中/低)
- 修复建议
Important Notes
重要注意事项
- Live capture requires root/sudo privileges
- Requires network access to specified interface
- PCAP analysis does not require elevated privileges
- Detection rules can be customized in config file
- Supports standard PCAP format from tcpdump, Wireshark, etc.
- 实时捕获需要root/sudo权限
- 需要能够访问指定的网络接口
- PCAP分析无需提升权限
- 可在配置文件中自定义检测规则
- 支持tcpdump、Wireshark等工具生成的标准PCAP格式