Custom Packet Analysis with Scriptable Filters/Analytics
ProofReader is a packet analyzer with strict syntax checks and programmable filter/analytics logic. With ProofReader one can easily create a Python script for any packet filtering algorithm. All packets in a capture file could be analyzed before a first filtering decision is made. Python code stubs for accessing individual packet field values are generated automatically with a GUI Wizard.
Easy access from Python to any packet field of any packet for custom analytics. Custom Python packet filters of any complexity are supported.
Our dissectors are built in strict compliance to the official specs. A non-standard packet is marked with a warning describing the issue.
If you are doing R & D and the packet analyzer tools you have yet to support the necessary application dissector, we will develop the one for you in a matter of weeks.
Wireshark is a superb tool for catching complex TCP/IP connectivity problems. But nothing is perfect. You may consider ProofReader when Wireshark doesn't include an application dissector you need or find analytical capabilities of Wireshark insufficient.
ProofReader dissectors automatically add a descriptive warning to the packet decode tree when a discrepancy in the packet structure is detected. This capability could come in handy in development of a new protocol stack from specs. ProofReader programmable filters support easy access to all fields at all layers of a packets. Two-pass filters allow working through all packets in the file before making a filtering decision. This could be used for auto-aggregating packets into transactions, for example. No need to remember long dot-separated field names. They are auto generated by a GUI Wizard.
ProofReader makes analyzing packets with Python easy.