Airmon-ng capture packets to files

Posted on 2009-02-19
Last Modified: 2012-05-06

I'm looking for a good program that can take my decrypted capture files from airmon-ng, process them and create files such as images and documents that are contained within the captured packets.

I've read of a program called "give me too" (GMT) that does this for ethernet, but not for wireless.

I've also read about a program / tool, "802ether", that translates from 802.11 to ethernet capture files... and you can then use GMT.

Anyone here who got experience with other programs or methods?

-- Many thanks
Question by:Blomholm
    LVL 33

    Accepted Solution

    I usually just extract them using wireshark. Is there some reason you can't do this?
    LVL 3

    Author Comment

    Havent tried yet. Just doing some research atm. So I'll give wireshark a go.
    LVL 3

    Author Comment

    Alright, so I've tried Wireshark. It works well for the HTTP protocol. I can pick export -> objects -> HTTP and I get most stuff going on that.
    But I'd like a program that recognizes other stuff as well. Like MSN Chat, mail messages, irc, +++. So it seems wireshark is only a partial solution for me.
    LVL 33

    Expert Comment

    by:Dave Howe
    I find that the dissectors or "follow conversation" filter in wireshark do most of what I want. A superior product to ws is "omnipeek" - but its far from cheap. My employer pays for mine :)
    LVL 3

    Author Closing Comment

    Thanks for your help.
    Not an exact match to what I'm looking for, but close.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
    You cannot be 100% sure that you can protect your organization against crypto ransomware but you can lower down the risk and impact of the infection.
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now