I'm building a tool to inspect PCAP files using PyShark, however am struggling to extract the specific protocols from the packets (e.g. SSH, MQTT, ARP) rather than just TCP or UDP.
I'm wondering if anyone has experience with this? I've tried packet.ip.proto
but that just returns TCP and UDP ID numbers, not names such as SSH or ARP.
I'm trying to get the same information as Wireshark shows in the below example:
Thanks!
Think I've figured it out. Looks like each specific type of protocol adds its own layer to the packet, so by printing out all the layers in a packet, you can identify any non-standard layers.
Output:
You can get a usable list of the layer names like so:
Output: