This repository contains a collection of Lua scripts designed to extend Wireshark's functionality. These plugins facilitate enhanced packet analysis and provide additional insights into network traffic.
-
check_asn.lua:
- Uses an external ASN (Autonomous System Number) database in TSV format to enrich packet data with ASN information.
- The required database file can be downloaded from this link and extracted before use.
- You must indicate the path to the tsv file with the ASN database in the script.
- Once the plugin is loaded, it is ready for use without additional actions, automatically adding an
asnfield to packet details.
-
check_ipinfo.lua:
- Enhances packet details by fetching comprehensive IP information from external services (https://ipinfo.io), including geolocation, ISP details, and more.
- Requires an internet connection for real-time lookups.
-
rtp_h265_typ33_extractor.lua:
- A specialized dissector that processes RTP packets carrying H.265 streams (payload type 33).
- Extracts h.265 stream from pcap file and saves to new file. Can be played later e.g. in VLC.
-
ja3_tls.lua:
- This Lua script is a Wireshark plugin for analyzing TLS traffic.
- It extracts JA3 and JA3S fingerprints from ClientHello and ServerHello messages and displays them in the packet details tree.
- The script also performs basic anomaly detection, such as spotting possible data exfiltration or large downloads.
- Additionally, it provides a Tools menu option to export all collected session statistics into a CSV file on the user’s Desktop.
To utilize these plugins in Wireshark, place the Lua scripts in the appropriate directory based on your operating system:
- macOS:
/Applications/Wireshark.app/Contents/PlugIns/wireshark/ - Windows:
C:\Program Files\Wireshark\Plugins\ - Linux:
/usr/lib/wireshark/plugins/
Instead of restarting Wireshark, you can reload the Lua plugins dynamically:
- Go to Analyze -> Reload Lua Plugins to apply changes without restarting.
- Once installed, the plugins will automatically process relevant packets during capture or analysis.
- For check_ipinfo.lua, a Check IPinfo button will appear in the Tools menu to activate its functionality.
- For rtp_h265_typ33_extractor.lua, an Extract H265 from RTP button will appear in the Tools menu to enable extraction.
- check_asn.lua automatically adds an
asnfield to packet details and is ready for use immediately after loading, requiring no additional actions beyond placing the pre-downloaded database in the correct location. - ja3_tls.lua automatically adds an
TLS JA3/JA3S Analysisfield to packet details and is ready for use immediately after loading. To export all fingerprints and session statistics go to menu Tools → Export JA3 Analysis. A CSV file named tls_fingerprints.csv will be saved on your Desktop.
These scripts are developed and tested for Wireshark versions 4.4.3 or later.
Contributions are welcome! If you have improvements or additional scripts to share:
- Fork this repository.
- Create a new branch for your feature or fix.
- Commit your changes with clear descriptions.
- Push to your branch and submit a pull request.
Note: These plugins are provided as-is. Ensure you understand the functionality of each script before use, especially in production environments.
