Skip to content
This repository has been archived by the owner on Apr 16, 2021. It is now read-only.
Doug Burks edited this page Feb 18, 2017 · 15 revisions

What is Xplico?

From http://www.xplico.org/about:

The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isn’t a network protocol analyzer. Xplico is an open source Network Forensic Analysis Tool (NFAT).

How do I access Xplico in Security Onion?

Xplico is only enabled if you choose Evaluation Mode. Production Mode disables Xplico.

Xplico's default credentials are listed here: http://wiki.xplico.org/doku.php?id=interface

Where do I go for more information about Xplico?

For more information, please see:
http://www.xplico.org/

Clone this wiki locally