package modules import ( "fmt" "github.com/evilsocket/bettercap-ng/core" "regexp" "github.com/google/gopacket" "github.com/google/gopacket/layers" ) var httpRe = regexp.MustCompile("(?s).*(GET|HEAD|POST|PUT|DELETE|CONNECT|OPTIONS|TRACE|PATCH) (.+) HTTP/\\d\\.\\d.+Host: ([^\\s]+)") var uaRe = regexp.MustCompile("(?s).*User-Agent: ([^\\n]+).+") func httpParser(ip *layers.IPv4, pkt gopacket.Packet, tcp *layers.TCP) bool { data := tcp.Payload dataSize := len(data) if dataSize < 20 { return false } m := httpRe.FindSubmatch(data) if len(m) != 4 { return false } method := string(m[1]) hostname := string(m[2]) path := string(m[3]) ua := "" mu := uaRe.FindSubmatch(data) if len(mu) == 2 { ua = string(mu[1]) } url := fmt.Sprintf("%s", core.Yellow(path)) if tcp.DstPort != 80 { url += fmt.Sprintf(":%s", vPort(tcp.DstPort)) } url += fmt.Sprintf("%s", hostname) NewSnifferEvent( pkt.Metadata().Timestamp, "http", ip.SrcIP.String(), hostname, SniffData{ "Method": method, "Hostname": hostname, "URL": url, "UA": ua, }, "[%s] %s %s %s %s %s", vTime(pkt.Metadata().Timestamp), core.W(core.BG_RED+core.FG_BLACK, "http"), vIP(ip.SrcIP), core.W(core.BG_LBLUE+core.FG_BLACK, method), vURL(url), core.Dim(ua), ).Push() return true }