View the Project on GitHub cetic/foren6

Getting Started with Step-By-Step Walkthroughs

Example 1: Analysing a pre-recorded RPL collect network trace

In this first example, we will analyse a previously recorded PCAP file. This example is meant to be standalone, so reading the User Manual is recommended but not required. Requirements: an installation of foren6, but no extra hardware.

> Follow this example

Example 2: Analysing a real network with a Contiki-based sniffer

The fastest way to get started with a physical sniffer to analyser a real network. It is not necessary to follow the previous examples if you want to analyse a real network in the shortest time possible. Requirements: an installation of foren6, and a Contiki-compatible mote with a USB connector (TMote/Sky, TelosB, CM500x, Z1, Econotag…)

> Follow this example

Example 3: Analysing a pre-recorded multi-DODAG network trace

This is another example using a pre-recorded PCAP file. We recommend to follow Example 1 first, as there are some introductory details which are not repeated in this example. This example explores in more details the RPL-related information extracted from the packet traces. Requirements: an installation of foren6, but no extra hardware.

Under Construction…

> Follow this example

Example 4: Analysing a real network with a commercial sniffer

Under Construction…

> Follow this example