Wireshark plugin for analyzing COM-RPC calls going over the wire.
The .lua file need to be placed in Wireshark's "plugins" folder together with the generated .data file (in Windows this is normally %APPDATA%\Wireshark\plugins or %APPDATA%\Roaming\Wireshark\plugins and on Linux ~/.local/lib/wireshark/plugins).
Once the plugin is installed Wireshark will automatically dissect COM-RPC frames of the captured pcap data. Typically you will want to filter by "thunder-comrpc" protocol or a specific process (shortcuts are available in Tools/ThunderShark menu).
Note that version 4.0 (or greater) of Wireshark is required.
Go to Edit/Preferences/Protocols/Thunder COM-RPC Protocol to set port numbers and other options. Make sure to select proper instance ID size.
Use ./GenerateLua.sh
to create protocol-thunder-comrpc.data
and place it
together with protocol-thunder-comrpc.lua
in the Wireshark plugins directory.
Configure Thunder to use a TCP/IP socket COM-RPC communication (e.g. port 62000). You can also capture other COM servers (like OpenCDM) simultaneously.
On the DUT execute
tcpdump -i lo port 62000 -w /tmp/comrpc-traffic-dump.pcap
(Or use any other tool able to capture TCP/IP traffic and save it to a pcap file.)
Start WPEFramework.
Load the .pcap file into Wireshark, dive deep.