{"id":1875,"date":"2016-12-17T22:47:19","date_gmt":"2016-12-17T22:47:19","guid":{"rendered":"https:\/\/zed.inguardians.com\/?p=1875"},"modified":"2018-12-18T17:29:06","modified_gmt":"2018-12-18T17:29:06","slug":"nm2lp-netmon-to-libpcap","status":"publish","type":"post","link":"https:\/\/zed.inguardians.com\/tools\/nm2lp-netmon-to-libpcap\/","title":{"rendered":"nm2lp (NetMon to LibPcap)"},"content":{"rendered":"
While the NetMon UI has powerful features for analyzing packet captures, few attack tools include the ability to natively read from the NetMon stored capture file format. In order to leverage tools such as Aircrack-ng, coWPAtty and Cain for wireless analysis, the capture file format needs to be libpcap- compatible. Some tools such as Wireshark support reading and converting NetMon Ethernet captures, but do not correctly interpret NetMon wireless captures.Fortunately, the NetMon API allows developers to write custom applications and interpret data from NetMon stored captures. Combined with the ability to create a libpcap capture file, it is possible to convert the NetMon file to a libpcap file. nm2lp converts NetMon wireless captures to libpcap format, making them useful in these other tools.You can read more about nm2lp in Josh Wright\u2019s\u00a0\u201cVista Wireless Power Tools for the Penetration Tester\u201d<\/a>\u00a0paper.<\/p>\n