Wireshark MCP Server
by A-G-U-P-T-A
This project exposes PyShark functionality through the Model Context Protocol (MCP), allowing AI assistants like Claude to interact with network packet capture and analysis capabilities.
Last updated: N/A
Wireshark MCP Server
This project exposes PyShark functionality through the Model Context Protocol (MCP), allowing AI assistants like Claude to interact with network packet capture and analysis capabilities.
Installation
- Install the required dependencies:
# Install with uv (recommended)
uv add mcp[cli] pyshark
# Or with pip
pip install mcp[cli] pyshark
- Clone this repository:
git clone https://github.com/A-G-U-P-T-A/wireshark-mcp
cd wireshark-mcp
Requirements
- Python 3.8+
- TShark (Wireshark's command-line component) must be installed
- Administrative/root privileges for live packet capture
Usage
Running the server
You can run the server in development mode with the MCP Inspector:
mcp dev pyshark_mcp.py
Or install it directly in Claude Desktop:
mcp install pyshark_mcp.py
Available functionality
This MCP server exposes the following:
Resources
pyshark://version
- Gets the PyShark version informationpyshark://config
- Gets the PyShark configurationpyshark://capture-history
- Gets history of previous packet captures
Tools
list_interfaces
- Lists all available network interfacescapture_live_packets
- Captures live packets from a network interfaceread_pcap_file
- Reads and analyzes a packet capture fileanalyze_traffic
- Analyzes network traffic patterns from a capture
Advanced tools provided in advanced_captures.py
:
capture_targeted_traffic
- Captures traffic targeted to specific host, port, or protocolcapture_to_file
- Captures network traffic and saves to a pcap fileanalyze_http_traffic
- Analyzes HTTP traffic from a capture filedetect_network_protocols
- Detects and reports network protocols in use
Prompts
packet_capture_help
- Provides help information about packet capturing with PyShark
Example usage in Claude
Once the server is installed in Claude Desktop, you can interact with it like this:
You: What interfaces are available for network capture?
Claude: Let me check the available network interfaces on your system.
[Calls list_interfaces tool]
You: Can you capture HTTP traffic for 10 seconds?
Claude: I'll capture HTTP traffic for 10 seconds.
[Calls capture_live_packets with appropriate parameters]
You: Can you analyze the traffic I just captured?
Claude: Here's an analysis of the captured traffic:
[Calls analyze_traffic to provide insights]
Remember to always ensure you have permission to capture network traffic.
Security Considerations
Network packet capture is a sensitive operation. Please ensure:
- You have proper authorization to capture network traffic
- You comply with all applicable laws and regulations
- You don't capture sensitive or private data inadvertently
- You handle capture files securely to prevent unauthorized access
Requirements
- PyShark: Python wrapper for TShark
- TShark: Command-line version of Wireshark (must be installed separately)
- Administrative privileges: Often required for live packet capture
Customization
You can customize this MCP server by:
- Adding more advanced capture and analysis tools
- Implementing filters for specific traffic types
- Creating specialized analysis functions for protocols of interest
- Extending the capture history management capabilities