Difference between revisions of "Tcpflow"

From ForensicsWiki
Jump to: navigation, search
m (Distributions)
Line 41: Line 41:
== Distributions==
== Distributions==
* Packages for [http://kaneda.bohater.net/slackware/packages/ Slackware] contributed by [http://kaneda.bohater.net Kanedaaa]
<li>Packages for <a href="http://kaneda.bohater.net/slackware/packages/">Slackware</a> contributed by <a href="http://kaneda.bohater.net">Kanedaaa</a></li>
* [http://packages.debian.org/testing/tcpflow Debian package] by [[Robert McQueen]]
<li><a href="http://packages.debian.org/testing/tcpflow">Debian package</a> by <a href="mailto:robot101@debian.org">Robert McQueen</a></li>
* [https://admin.fedoraproject.org/pkgdb/acls/name/tcpflow Fedora Package] by [http://koji.fedoraproject.org/koji/userinfo?userID=278 Terje Røsten]
<li><a href="https://admin.fedoraproject.org/pkgdb/acls/name/tcpflow">Fedora Package</a> by <a href="http://koji.fedoraproject.org/koji/userinfo?userID=278">Terje Røsten</a></li>
* [ftp://ftp5.freebsd.org/pub/FreeBSD/branches/-current/ports/net/tcpflow FreeBSD Port] by [[Jose M. Alcaide]]</li>
<li><a href="ftp://ftp5.freebsd.org/pub/FreeBSD/branches/-current/ports/net/tcpflow">FreeBSD Port</a> by <a href="mailto:jose@we.lc.ehu.es">Jose M. Alcaide</a></li>
* [http://www.openbsd.org/ports.html">OpenBSD Package</a>(it&#8217;s in there somewhere)
<li><a href="http://www.openbsd.org/ports.html">OpenBSD Package</a>(it&#8217;s in there somewhere)</li>
* [ftp://ftp.sunfreeware.com/pub/freeware/sparc/8/tcpflow-0.12-sol8-sparc-local.gz Solaris 8 SPARC Binary] for v0.12 from [http://www.sunfreeware.com SunFreeware.com]
<li><a href="ftp://ftp.sunfreeware.com/pub/freeware/sparc/8/tcpflow-0.12-sol8-sparc-local.gz">Solaris 8 SPARC Binary</a> for v0.12 from <a href="http://www.sunfreeware.com">SunFreeware.com</a></li>
* [http://www.entropy.ch/software/macosx/#tcpflow Mac OS X package] by [[Marc Liyanage]]
<li><a href="http://www.entropy.ch/software/macosx/#tcpflow">Mac OS X package</a> by <a href="mailto:liyanage@access.ch">Marc Liyanage</a></li>
[[Category:Network Forensics]]
[[Category:Network Forensics]]

Revision as of 04:21, 12 April 2012

Maintainer: Simson Garfinkel
OS: Linux
Genre: Network forensics
License: GPL
Website: https://github.com/simsong/tcpflow

tcpflow is a program that captures data transmitted as part of TCP connections (flows), and stores the data in a way that is convenient for protocol analysis and debugging. Each TCP flow is stored in its own file. Thus, the typical TCP flow will be stored in two files, one for each direction. tcpflow can also process stored ‘tcpdump’ packet flows.

tcpflow is similar to ‘tcpdump’, in that both process packets from the wire or from a stored file. But it’s different in that it reconstructs the actual data streams and stores each flow in a separate file for later analysis.

tcpflow understands sequence numbers and will correctly reconstruct data streams regardless of retransmissions or out-of-order delivery.

Jeremy Elson developed the first version of tcpflow in 1999 but stopped maintaining it in 2003. In 2006 Simson Garfinkel took over maintenance of the program and added:

  • support for VLANs
  • support for IPv6
  • DFXML output of the connections in a report.xml file.
  • Improved performance through the use of the C++ STL classes.
  • Support for continuous operation (tcpflow now purges out old flows).
  • Variable Filename specifications.
  • A plug-in architecture.

tcpflow is based on the LBL Packet Capture Library (available from LBL) and therefore supports the same rich filtering expressions that programs like ‘tcpdump’ support. It should compile under most popular versions of UNIX; see the INSTALL file for details. tcpflow stores all captured data in files that have names of the form:[VLAN]

where the contents of the above file would be data transmitted from host port 2345, to host port 45103. VLAN information, if provided is stored in brackets.


tcpflow stores all captured data in files that have names of the form

where the contents of the above file would be data transmitted from host port 2345, to host port 45103.


  • tcpflow does not understand IP fragments;
  • tcpflow does not understand 802.11 headers.