Your VoIP Tracer now has a sample PCAP file: sample_voip_traffic.pcap
Contains:
- 5 VoIP calls with different scenarios
- SIP signaling packets (INVITE, 200 OK)
- Bidirectional RTP audio streams
- Suspicious calling patterns
- 8,134 total packets (625 KB)
# Install Wireshark first, then use tshark
tshark -i eth0 -f "port 5060 or portrange 8000-65000" -w voip_capture.pcap
# Or capture existing network traffic
tshark -r existing_network.pcap -Y "sip or rtp" -w voip_only.pcap# Install SIPp
sudo apt-get install sipp # Linux
brew install sipp # macOS
# Generate SIP traffic
sipp -sn uac 192.168.1.100:5060 -l 10 -m 100Download pre-made VoIP PCAP files from:
-
Wireshark Sample Captures:
- https://wiki.wireshark.org/SampleCaptures
- Look for: SIP, RTP, VoIP samples
-
Malware Traffic Analysis:
- https://malware-traffic-analysis.net/
- Contains real-world network captures
-
PacketLife.net:
- http://packetlife.net/captures/
- Various protocol samples including VoIP
If you have access to an Asterisk PBX:
# Make test calls and capture
tcpdump -i any -s 65535 -w voip_test.pcap port 5060 or portrange 10000-20000# Run our generator with different parameters
python generate_voip_pcap.pyYour PCAP should contain:
- SIP packets (port 5060) for call signaling
- RTP packets (high ports) for audio streams
- RTCP packets for quality reporting
- Proper IP addresses and port ranges
- Call-ID headers in SIP messages
Use our debug tool:
python pcap_debug.py your_file.pcapThis will show:
- Total packets and protocols
- VoIP packet detection results
- Common ports and traffic patterns
- Extraction success/failure
- Start the backend:
python -m uvicorn src.api:app --host 0.0.0.0 --port 8002 - Start the frontend:
cd frontend && npm run dev - Go to: http://localhost:5173
- Upload your PCAP file
- View analysis results
"No VoIP packets found":
- Check if PCAP contains SIP/RTP traffic
- Verify port ranges (5060 for SIP, 8000+ for RTP)
- Use tcpdump with proper filters
- Try our debug tool first
Event loop errors:
- We've fixed the asyncio conflicts
- Backend now handles pyshark properly
- Use threading for packet processing
- Capture real traffic during actual VoIP calls for best results
- Use proper filters when capturing (sip or rtp)
- Include both signaling and media for complete analysis
- Test with our sample file first to verify the system works
- Check file permissions and size limits (100MB max)