This is a list of public packet capture repositories, which are freely available on the Internet.
Most of the sites listed below share Full Packet Capture (FPC) files, but some do unfortunately only have truncated frames.
This category includes network traffic from exercises and competitions, such as Cyber Defense Exercises (CDX) and red-team/blue-team competitions.
MACCDC - Pcaps from National CyberWatch Mid-Atlantic Collegiate Cyber Defense Competition
ISTS - Pcaps from The Information Security Talent Search
Captures from the "2009 Inter-Service Academy Cyber Defense Competition" served by Information Technology Operations Center (ITOC), United States Military Academy
PCAP files from capture-the-flag (CTF) competitions and challenges.
DEFCON Capture the Flag Contest traces (from DEF CON 8, 10 and 11)
DEFCON 17 Capture the Flag Contest traces
https://media.defcon.org/torrent/DEF CON 17 CTF.torrent (torrent)
https://media.defcon.org/dc-17/DEFCON 17 Hacking Conference - Capture the Flag complete packet capture.rar (direct download)
DEFCON Capture the Flag pcaps (see collections of files related to the Capture the Flag contest from DEF CON 17 to 22)
https://www.defcon.org/html/torrent/DEF%20CON%2018%20CTF.torrent (DEF CON 18 torrent)
https://www.defcon.org/html/torrent/DEF%20CON%2019%20CTF.torrent (DEF CON 19 torrent)
https://www.defcon.org/html/torrent/DEF%20CON%2020%20ctf.torrent (DEF CON 20 torrent)
https://www.defcon.org/html/torrent/DEF%20CON%2021%20ctf%20friday.torrent (DEF CON 21 torrent, Friday) http://www.defcon.org/html/torrent/DEF%20CON%2021%20ctf%20saturday.torrent (DEF CON 21 torrent, Saturday) http://www.defcon.org/html/torrent/DEF%20CON%2021%20ctf%20sunday.torrent (DEF CON 21 torrent, Sunday) http://www.defcon.org/html/torrent/DEF%20CON%2022%20ctf%20teams.torrent (DEF CON 22 torrent)
No cON Name 2014 CTF Finals, "Vodka" challenge
https://github.com/MarioVilas/write-ups/raw/master/ncn-ctf-2014/Vodka/vodka (bzip2 compressed PCAP-NG file)
Captured malware traffic from honeypots, sandboxes or real world intrusions
Capture the hacker 2013 competition (by Dr. David Day of Sheffield Hallam University)
http://www.snaketrap.co.uk/ contains honeypot PCAP files from three different setups:
Contagio Malware Dump: Collection of PCAP files categorized as APT, Crime or Metasplot
http://www.mediafire.com/?a49l965nlayad (see blog post)
WARNING: The password protected zip files contain real malware
Also see Contagio's PCAP files per case:
Malware analysis blog that shares malware as well as PCAP files
Stratosphere IPS - PCAP and Argus datasets with malware traffic, created by Sebastian Garcia (@eldracote) at the ATG group of the Czech Technical University
Ponmocup malware/trojan (a.k.a. Milicenso) PCAP by Tom Ueltschi a.k.a. @c_APT_ure
Also see original source (password protected zip) and analysis writeup (text)
Free malware analysis sandbox. Malware samples can be uploaded or searched, PCAP files from sandbox execution can be downloaded.
Online client honeypot for sharing, browsing and analyzing web-based malware. PCAP download available for analyzed sites.
Network forensics training, challenges and contests
Hands-on Network Forensics - Training PCAP dataset from FIRST 2015
https://www.first.org/_assets/conf2015/networkforensics_virtualbox.zip (VirtualBox VM)
Forensic Challenge 14 – “Weird Python“ (The Honeynet ProjectThe Honeynet Project)
Network Foreniscs Puzzle Contest (by Lake Missoula Group, LLC)
DFRWS 2008 Challenge
DFRWS 2009 Challenge
DFIR MONTEREY 2015 Network Forensics Challenge (by Phil Hagen of SANS)
DigitalBond S4x15 ICS Village CTF PCAPs
PCAP files from the DEF CON 22 Industrial Control System Village
http://media.defcon.org/DEF CON 22/DEF CON 22 ics village/ (requires RAR v5)
Note from Netresec:
Although the DEFCON 22 ICS Village PCAP is recorded in an ICS setup we've noticed that the 90MB capture file does not contain any SCADA/ICS traffic. The PCAP file only contains broadcast packets, which is why we suspect that they forgot to configure a monitor (SPAN) port on the switch.
Pcap files with attacks against Industrial Control Systems (created by US Cyber Challenge) - See Cyber Quest February 2012
SharkFest'15 Packet Challenge
https://sharkfest.wireshark.org/assets/presentations15/packetchallenge.zip (via SharkFest)
DARPA Intrusion Detection Data Sets from 1998 and 1999
OpenPacket.org Capture Repository (maintained by JJ Cummings created by Richard Bejtlich)
Tim's packet Zoo
Over 4 GB of network forensic training data from DEEP (Digital Evaluation and Exploitation Department of Computer Science, Naval Postgraduate School).
Case details can be found at Jesse Kornblum's blog.
Pcap files for testing Honeybadger TCP injection attack detection
Laura's Lab Kit v.9 ISO image (old)
Sample capture files from: "Practical Packet Analysis - Using Wireshark to Solve Real-World Network Problems" by Chris Sanders
Megalodon Challenge by Jasper Bongertz - "a real world network analysis problem, with all its confusion, drawbacks and uncertainties" (3.8 GB sanitized PCAP-NG files)
Blog post: https://blog.packet-foo.com/2015/07/the-megalodon-challenge/
Direct link: http://www.packet-foo.com/megalodon2015/MegalodonChallenge.7z
Anonymous FTP connections to public FTP servers at the Lawrence Berkeley National Laboratory
Pcapr (Mu Dynamics) - A capture repository with pcap files of various traffic types
Understand project Downloads - Lots of different capture file formats (pcap, pcapng/ntar, pcangpklg and more...)
ISCX 2012 Dataset.
Over 80 GB of pcap data available for researchers (created by Ali Shiravi, Hadi Shiravi, and Mahbod Tavallaee from University of New Brunswick)
Research PCAP datasets from FOI's Information Warfare Lab (FOI is The Swedish Defence Research Agency)
ftp://download.iwlab.foi.se/dataset/smia2011/Network_traffic/ (SMIA 2011, FTP server)
http://download.netresec.com/pcap/smia-2011/ (SMIA 2011, web mirror)
ftp://download.iwlab.foi.se/dataset/smia2012/network_traffic/pcap/ (SMIA 2012, FTP server)
http://download.netresec.com/pcap/smia-2012/ (SMIA 2012, web mirror)
Internet Traffic Archive (Berkeley Lab) - mostly tcpdump ASCII output
WITS: Waikato Internet Traffic Storage (traces in ERF format with headers plus 4 bytes of application data)
The FTP site uses rate limiting for IPv4 connections, but no ratelimit for IPv6 connections.
Bro IDS trace files (no application layer data)
SimpleWeb captures (mainly packet headers)
Wireless LAN Traces from ACM SIGCOMM'01 (no application layer data)
Wireshark Fuzzed Protocol Capures (only fuzzed packets)
MDSec, Packets from a GSM 2.5G environment showing uplink/downlink, two MS devices, SIM APDU information.
Raul Siles, “Pcap files containing a roaming VoIP session”
Russ McRee, W32/Sdbot infected machine
Joke Snelders, WiFi traffic encrypted with WPA pre-shared key (passphrase "subnet16121930", SSID "dd-wrt2").
Read Joke's "Wireshark and TShark: Decrypt Sample Capture File" blog post for decryption instructions.
hack.lu 2009 Information Security Visualization Contest (honeypot traffic, mostly SSH and HTTP)
Barracuda Labs on the PHP.net Compromise [blog post]
Convert PcapNG files to PCAP format
CloudShark - Wireshark-like analysis in your browser
NetworkTotal - Runs uploaded PCAP through Suricata IDS
Pcap2Bubbles - online graphical vizualisation of flows
Have We Missed Some PCAP Hive?
Please send an e-mail to < info [at] netresec.com > or tweet to @netresec if you know some additional PCAP resource available on the Internet.
Do you need help with web hosting of your PCAP files?
Feel free to e-mail < info [at] netresec.com > or tweet to @netresec if you have PCAP files that you would like to share with the rest of the world, but need help with web hosting. We can provide a home online for your datasets, no matter how large they are.
Why do we like PCAP files so much?
Because: PCAP or it didn't happen!