Python 使用Pyshark将JSON数据包中的密钥和值配对
我正在尝试使用Pyshark解析PCAP文件。一些数据包中有JSON,我正试图用匹配的key:value打印出来 这是我目前正在进行的测试:Python 使用Pyshark将JSON数据包中的密钥和值配对,python,python-3.x,pyshark,Python,Python 3.x,Pyshark,我正在尝试使用Pyshark解析PCAP文件。一些数据包中有JSON,我正试图用匹配的key:value打印出来 这是我目前正在进行的测试: import pyshark packets = pyshark.FileCapture('cap.pcapng') pack = packets[1] #get the packet that has JSON print(pack.json.get_field_value('app') 这样做时,我没有得到任何打印 如果我打印整个JSON层,我会
import pyshark
packets = pyshark.FileCapture('cap.pcapng')
pack = packets[1] #get the packet that has JSON
print(pack.json.get_field_value('app')
这样做时,我没有得到任何打印
如果我打印整个JSON层,我会得到如下数据:
Object
Member Key: anonymousId
String value: f268204c-5719-43ce-9a5e-094d8f3df6b8
Key: anonymousId
True value
Object
Object
Object
Object
Object
Object
Member Key: context
Member Key: app
Member Key: app_name
Member Key: app_platform
Member Key: app_version
Member Key: device
Member Key: adTrackingEnabled
Member Key: advertisingId
Member Key: id
Member Key: manufacturer
Member Key: model
Member Key: resolution
Member Key: type
Member Key: version
Member Key: ip
Member Key: library
Member Key: name
Member Key: version
Member Key: locale
Member Key: os
Member Key: name
Member Key: version
Member Key: primary_business_unit
Member Key: secondary_business_unit
Member Key: traits
Member Key: entitlements
Member Key: mvpd
Member Key: userAgent
Member Key: event
Member Key: properties
Member Key: type
Member Key: userId
String value: Fox Now
String value: foxnow
String value: roku
String value: 3.18.0
String value: 622ac229-c26e-5318-89bd-b281da9bed32
String value: 1de01830-d4bb-5d12-9d86-f81da8d12698
String value: Roku
String value: 3600X
String value: 1080p
String value: roku
String value: 249.10E04111A
String value: 71.120.154.30
String value: SegmentAnalyticsService.brs
String value: 3.18.0 (11624)
String value: en-US
String value: Roku
String value: 9.10 build 4111
String value: fng
String value: fox
String value: btn-btn2go,fbc-fox,FoxBusiness,foxdep,FoxNews,fs1,fs2,fx,fxm,fxx,ngc,ngw
String value: verizon
String value: Roku/DVP-9.10 (249.10E04111A)
String value: Live TV Section Viewed
String value: track
String value: MTM0OTA5MDktNWE1MC00YTg4LWJhNWItYzdmMDA1N2UyYjQz
Key: app
Key: app_name
Key: app_platform
Key: app_version
Key: adTrackingEnabled
Key: advertisingId
Key: id
Key: manufacturer
Key: model
Key: resolution
Key: type
Key: version
Key: device
Key: ip
Key: name
Key: version
Key: library
Key: locale
Key: name
Key: version
Key: os
Key: primary_business_unit
Key: secondary_business_unit
Key: entitlements
Key: mvpd
Key: traits
Key: userAgent
Key: context
Key: event
Key: properties
Key: type
Key: userId
这就是JSON的样子
我希望能够遍历JSON中的每个值,并打印它所持有的值和键
所以我想打印JSON输出在匹配时的基本情况
我尝试过谷歌搜索,但找不到任何对我有用的例子。在尝试通过Filecapture方法打开PCAP文件时,设置“use_json=True”。这将以类似JSON的格式捕获数据包
import pyshark
packets = pyshark.FileCapture('cap.pcapng',use_json=True,include_raw=True)
pack = packets[1] #get the packet that has JSON
jsonStr=str(pack.json)
print(jsonStr)
这将以以下方式打印数据包的JSON层:
Layer JSON:
object_raw: 7ba298
object_raw: 234
object_raw: 97
object:
member_raw: 345ad
member_raw: 4567
member:
key: manufacturer
string: Live TV Section Viewed
value.string: abcd
value.string_raw: ab345
key_raw: 8abc6
string_raw: 67ac
member:
key: ip
string: 71.120.154.30
value.string: 234
value.string_raw: ab345
key_raw: 8abc6
string_raw: 67ac
因此,这个字符串jsonStr中的每个“成员”段都包含一个“键”字段和一个“字符串”字段,它们与原始JSON中的键值对以及其他原始数据相对应。在使用FileCapture方法捕获数据包时,可以使用“include_raw=False”忽略原始数据。例如,通过使用键“manufacturer”和值字符串或数字的数据类型,可以提取所需键的值