CAPWAP DTLS MITM (Man-In-The-Middle) Proxy
Go to file
Andreas Schultz 90c98f4a83 work arround for gnutls DTLS fragment bug 2014-12-30 15:36:38 +01:00
certs initial version 2014-12-28 12:17:24 +01:00
include/compat/sys initial version 2014-12-28 12:17:24 +01:00
m4 initial version 2014-12-28 12:17:24 +01:00
src work arround for gnutls DTLS fragment bug 2014-12-30 15:36:38 +01:00
.gitignore initial version 2014-12-28 12:17:24 +01:00
AUTHORS initial version 2014-12-28 12:17:24 +01:00
COPYING initial version 2014-12-28 12:17:24 +01:00
ChangeLog initial version 2014-12-28 12:17:24 +01:00
Makefile.am initial version 2014-12-28 12:17:24 +01:00
NEWS initial version 2014-12-28 12:17:24 +01:00
README.md initial version 2014-12-28 12:17:24 +01:00
autogen.sh initial version 2014-12-28 12:17:24 +01:00
configure.ac initial version 2014-12-28 12:17:24 +01:00

README.md

capwap-mitm - CAPWAP DTLS MITM (Man-In-The-Middle) Proxy

This is DTLS MITM proxy for CAPWAP (RFC 5415). It can be used to decrypt and capture (in pcap format) encrypted CAPWAP traffic.

It's main purpose is for development, debugging and reverse engineering of CAPWAP sessions. It has no support for modifying the control or payload traffic.

Building

Requirements:

Under Debian/Ubuntu those dependencies should be available with:

apt-get install automake autoconf shtool libgnutls-dev libev-dev libpcap-dev

Rebuild configure and configure with:

./autogen.sh
./configure

Running

Put CAPWAP client and server certificates into ./certs or specify them on the command line (see capwap-mitm -h). By default cacerts.pem, client.pem, client.key, server.pem and server.key are expected. Certificates and keys can also be combined into a single file, then client.pem and server.pem should be used.

Run with:

src/capwap-mitm -o mitm.pcap <CAPWAP Server> <Local IP>

for example:

src/capwap-mitm -o mitm.pcap 192.168.13.168 172.28.0.2

By default the proxy listens to port 5246 and 5247.