mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#networkforensics

0 Beiträge0 Beteiligte0 Beiträge heute
Lazou<p>Ein weiteres Tool, das ich nutze, ist <a href="https://kanoa.de/tags/NetworkMiner" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkMiner</span></a></p><p>Es ist ein leistungsstarkes Open-Source-Tool für <a href="https://kanoa.de/tags/NetworkForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkForensics</span></a>, das mir die Extraktion von Artefakten wie Dateien, Bildern, E-Mails und Passwörtern aus PCAP-Dateien ermöglicht. NetworkMiner kann auch live Netzwerkverkehr erfassen und detaillierte Informationen über jede IP-Adresse aggregieren, was für passive Asset-Discovery und Übersichten über kommunizierende Geräte nützlich ist.</p><p>Seit 2007 hat sich NetworkMiner zu einem beliebten Tool für Incident-Response-Teams und Strafverfolgungsbehörden entwickelt und wird weltweit eingesetzt.</p><p>Für mich ein unverzichtbares Werkzeug, um Netzwerkdaten effizient und präzise zu analysieren.</p><p>😀 ✌🏼 </p><p><a href="https://kanoa.de/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://kanoa.de/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://kanoa.de/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://kanoa.de/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://kanoa.de/tags/NetworkAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkAnalysis</span></a> <a href="https://kanoa.de/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
MalwareLab<p>If you want to create your custom <a href="https://infosec.exchange/tags/packetsniffer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>packetsniffer</span></a> based on <a href="https://infosec.exchange/tags/Scapy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Scapy</span></a>, the recent webcast by <a href="https://infosec.exchange/tags/ActiveCountermeasures" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveCountermeasures</span></a> could be a good starting point.<br>Bill provided nice explanation and his sniffer template is available on GitHub.</p><p><a href="https://github.com/activecm/sniffer-template" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/activecm/sniffer-te</span><span class="invisible">mplate</span></a></p><p><a href="https://www.youtube.com/watch?v=gO3OjyyLN40" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=gO3OjyyLN4</span><span class="invisible">0</span></a></p><p><a href="https://infosec.exchange/tags/networkmonitoring" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networkmonitoring</span></a> <a href="https://infosec.exchange/tags/networkanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networkanalysis</span></a> <a href="https://infosec.exchange/tags/networkforensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networkforensics</span></a> <a href="https://infosec.exchange/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a></p>
MalwareLab<p>Top 10 <a href="https://infosec.exchange/tags/Networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Networking</span></a> <a href="https://infosec.exchange/tags/Tools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tools</span></a> &amp; Techniques by <a href="https://infosec.exchange/tags/ActiveCountermeasures" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveCountermeasures</span></a>. </p><p>I have lot of fun watching this video and there are several useful tips&amp;tricks by Chris and Bill.<br>Especially recommended to see use cases for <a href="https://infosec.exchange/tags/tshark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tshark</span></a>, <a href="https://infosec.exchange/tags/tcpdump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcpdump</span></a> with <a href="https://infosec.exchange/tags/BPF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BPF</span></a> and counting connections per hour from PCAP an <a href="https://infosec.exchange/tags/zeek" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeek</span></a> logs</p><p><a href="https://www.youtube.com/watch?v=0I6W175cUQk" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=0I6W175cUQ</span><span class="invisible">k</span></a></p><p><a href="https://infosec.exchange/tags/networkanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networkanalysis</span></a> <a href="https://infosec.exchange/tags/networktraffic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networktraffic</span></a> <a href="https://infosec.exchange/tags/networkforensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networkforensics</span></a></p>