Sponsored by Deepsite.site

Netforensicmcp

Created By
kylecui4 months ago
NetForensicMCP V2.1 is a Model Context Protocol (MCP) server designed to empower Large Language Models (LLMs) with advanced offline network traffic analysis and threat intelligence capabilities. Built on top of Wireshark's tshark, NetForensicMCP provides comprehensive PCAP analysis tools for cybersecurity professionals, threat hunters, and network forensics investigators.
Content

NetForensicMCP Logo

🔍 Advanced Network Forensics & Threat Intelligence Platform 🛡️

Version License Node.js Wireshark

NetForensicMCP v2.1

(Formerly WireMCP, Now Focused on Offline Forensic Analysis)

English | 中文

NetForensicMCP (formerly WireMCP) is a Model Context Protocol (MCP) server designed to empower Large Language Models (LLMs) with advanced offline network traffic analysis and threat intelligence capabilities. Built on top of Wireshark's tshark, NetForensicMCP provides comprehensive PCAP analysis tools for cybersecurity professionals, threat hunters, and network forensics investigators.

🚀 Key Features

Core Analysis Engine

  • Smart Stream Analysis: Intelligent content chunking to handle large PCAP files without token overflow
  • Threat Intelligence Integration: Built-in URLhaus blacklist checking with stream correlation
  • Credential Extraction: Automated detection of plaintext credentials across multiple protocols
  • High-Frequency IP Analysis: Proactive threat hunting through top communicator identification

Advanced Tools

  • get_summary_stats: Protocol hierarchy statistics for traffic composition overview
  • get_conversations: TCP/UDP conversation analysis with stream indexing
  • extract_stream_content: Precise payload extraction with pagination support
  • get_stream_info: Content size estimation to prevent token overflow
  • extract_stream_chunks: Automated large stream segmentation
  • get_top_ips: High-frequency communicator identification for proactive analysis
  • check_threats: Batch IP threat scanning with stream correlation
  • extract_credentials: Multi-protocol credential detection with context
  • capture_packets: Legacy live traffic capture (preserved for compatibility)

🔍 How It Empowers LLMs

NetForensicMCP transforms complex network forensics into LLM-accessible intelligence by:

  • 🎯 Threat-Driven Analysis: Prioritizes high-risk indicators over raw data processing
  • 📊 Structured Intelligence: Converts PCAP data into actionable threat intelligence
  • ⚡ Efficient Investigation: Optimized workflow prevents token exhaustion
  • 🔗 Correlation Engine: Links disparate network events into coherent attack narratives
  • 📝 Automated Reporting: Generates comprehensive security reports with IOCs and recommendations

🛡️ Cybersecurity Use Cases

  • 🕵️ Threat Hunting: Proactive identification of APT activities and C2 communications
  • 🔍 Incident Response: Rapid forensic analysis of network evidence
  • 📋 Compliance Auditing: Credential leak detection and security gap identification
  • 🚨 IOC Extraction: Automated indicator of compromise discovery
  • 📖 Attack Reconstruction: Timeline analysis and attack path visualization

📋 Installation

Prerequisites

  • Operating System: Windows, macOS, or Linux
  • Wireshark: Download here (tshark must be in PATH)
  • Node.js: v16+ recommended
  • npm: For dependency management

Setup

  1. Clone the repository:

    git clone https://github.com/kylecui/NetForensicMCP.git
    cd NetForensicMCP
    
  2. Install dependencies:

    npm install
    
  3. Launch the MCP server:

    node index.js
    

Note: NetForensicMCP auto-detects tshark or falls back to common installation paths on all platforms.

⚙️ MCP Client Configuration

Cursor IDE

Edit mcp.json in Cursor → Settings → MCP:

{
  "mcpServers": {
    "netforensicmcp": {
      "command": "node",
      "args": [
        "/ABSOLUTE_PATH_TO/NetForensicMCP/index.js"
      ]
    }
  }
}

Claude Desktop

macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%\Claude\claude_desktop_config.json

{
  "mcpServers": {
    "wiremcp": {
      "command": "node",
      "args": ["C:\\path\\to\\NetForensicMCP\\index.js"]
    }
  }
}

🔬 Example Analysis Workflows

Threat Intelligence Analysis

# Batch threat scanning with stream correlation
check_threats → extract_credentials → get_top_ips
ip_reputation (parallel) → ioc_detection → domain_analysis
extract_stream_content (targeted) → comprehensive_report

Advanced Forensics

# Large PCAP investigation
get_summary_stats → get_conversations → get_stream_info
extract_stream_chunks → extract_stream_content (paginated)
correlation_analysis → timeline_reconstruction

📊 Sample Output

Threat Analysis Report

⚠️  THREATS DETECTED (2):
🚨 192.168.1.100 - Streams: [tcp:0, tcp:2, udp:1]
🚨 10.0.0.50 - Streams: [tcp:5]

📋 RECOMMENDED NEXT STEPS:
1. Use threat intelligence tools to analyze these IPs
2. Extract stream content for streams containing these IPs  
3. Focus investigation on: 192.168.1.100, 10.0.0.50

Stream Content Analysis

Content of tcp stream 0 (chars 0-15000 of 45230):
POST /api/upload HTTP/1.1
Host: suspicious-domain.com
Authorization: Bearer eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9...

[TRUNCATED - More content available. Use offset=15000 to get the next chunk.]

🎯 Advanced Features

Smart Token Management

  • Intelligent Chunking: Automatic content segmentation prevents API limits
  • Pagination Support: Seamless navigation through large datasets
  • Size Estimation: Proactive content size assessment
  • Parallel Processing: Efficient batch operations

Threat Intelligence Integration

  • URLhaus Integration: Comprehensive malware URL database checking
  • Stream Correlation: Links threats to specific communication flows
  • IOC Extraction: Automated indicator discovery and validation
  • Proactive Scanning: Top communicator threat assessment

🛠️ Architecture

NetForensicMCP v2.1 implements an optimized investigation workflow:

  1. 📡 Reconnaissance Phase: Low-token traffic overview
  2. 🔍 Batch Scanning Phase: Parallel threat detection
  3. 🧠 Intelligence Phase: Deep threat correlation
  4. 📋 Planning Phase: Strategic analysis targeting
  5. 🎯 Payload Phase: Precision content extraction
  6. 📊 Reporting Phase: Comprehensive findings synthesis

🚀 Roadmap

  • 🔌 Extended IOC Sources: Integration with VirusTotal, AlienVault OTX
  • 🤖 ML-Powered Analysis: Behavioral pattern recognition
  • 📈 Timeline Visualization: Interactive attack reconstruction
  • 🔄 Enhanced Automation: Advanced workflow automation capabilities
  • 📱 Web Dashboard: Browser-based analysis interface

🤝 Contributing

We welcome contributions! Please see our contribution guidelines for details.

Areas for Contribution:

  • Threat Intelligence Sources: Additional IOC providers
  • Protocol Analyzers: New credential extraction methods
  • Performance Optimization: Large PCAP handling improvements
  • Documentation: Use cases and tutorials

📋 Documentation

📄 License

This project is licensed under the MIT License - see the LICENSE file for details.

📋 Changelog

See CHANGELOG.md for detailed version history and release notes.

Original Attribution

Based on the original WireMCP project by 0xkoda with significant enhancements for offline analysis and threat intelligence integration. We extend our gratitude to the original author for providing the foundational MCP framework and live capture capabilities that made this advanced forensics platform possible.

🙏 Acknowledgments

  • 0xkoda: Original WireMCP creator - thank you for the foundational live capture framework
  • Wireshark Team: For the excellent tshark packet analysis engine
  • Model Context Protocol Community: For the MCP framework and specifications
  • URLhaus (abuse.ch): For providing comprehensive threat intelligence data
  • Cybersecurity Community: For continuous feedback and improvement suggestions

⚡ Ready to revolutionize your network forensics? Get started with NetForensicMCP v2.1 today!

Server Config

{
  "mcpServers": {
    "NetForensicMCP": {
      "command": "node",
      "args": [
        "index.js"
      ]
    }
  }
}
Recommend Servers
TraeBuild with Free GPT-4.1 & Claude 3.7. Fully MCP-Ready.
CursorThe AI Code Editor
Visual Studio Code - Open Source ("Code - OSS")Visual Studio Code
AiimagemultistyleA Model Context Protocol (MCP) server for image generation and manipulation using fal.ai's Stable Diffusion model.
Baidu Map百度地图核心API现已全面兼容MCP协议,是国内首家兼容MCP协议的地图服务商。
TimeA Model Context Protocol server that provides time and timezone conversion capabilities. This server enables LLMs to get current time information and perform timezone conversions using IANA timezone names, with automatic system timezone detection.
WindsurfThe new purpose-built IDE to harness magic
Amap Maps高德地图官方 MCP Server
MCP AdvisorMCP Advisor & Installation - Use the right MCP server for your needs
BlenderBlenderMCP connects Blender to Claude AI through the Model Context Protocol (MCP), allowing Claude to directly interact with and control Blender. This integration enables prompt assisted 3D modeling, scene creation, and manipulation.
Serper MCP ServerA Serper MCP Server
DeepChatYour AI Partner on Desktop
ChatWiseThe second fastest AI chatbot™
Howtocook Mcp基于Anduin2017 / HowToCook (程序员在家做饭指南)的mcp server,帮你推荐菜谱、规划膳食,解决“今天吃什么“的世纪难题; Based on Anduin2017/HowToCook (Programmer's Guide to Cooking at Home), MCP Server helps you recommend recipes, plan meals, and solve the century old problem of "what to eat today"
Context7Context7 MCP Server -- Up-to-date code documentation for LLMs and AI code editors
Zhipu Web SearchZhipu Web Search MCP Server is a search engine specifically designed for large models. It integrates four search engines, allowing users to flexibly compare and switch between them. Building upon the web crawling and ranking capabilities of traditional search engines, it enhances intent recognition capabilities, returning results more suitable for large model processing (such as webpage titles, URLs, summaries, site names, site icons, etc.). This helps AI applications achieve "dynamic knowledge acquisition" and "precise scenario adaptation" capabilities.
Tavily Mcp
Playwright McpPlaywright MCP server
EdgeOne Pages MCPAn MCP service designed for deploying HTML content to EdgeOne Pages and obtaining an accessible public URL.
Jina AI MCP ToolsA Model Context Protocol (MCP) server that integrates with Jina AI Search Foundation APIs.
MiniMax MCPOfficial MiniMax Model Context Protocol (MCP) server that enables interaction with powerful Text to Speech, image generation and video generation APIs.