Elephantshark, a tool to monitor Postgres network traffic
https://neon.com/blog/elephantshark-monitor-postgres-network-traffic
#HackerNews #Elephantshark #Postgres #Monitoring #NetworkTraffic #DatabaseTools #DataSecurity
Elephantshark, a tool to monitor Postgres network traffic
https://neon.com/blog/elephantshark-monitor-postgres-network-traffic
#HackerNews #Elephantshark #Postgres #Monitoring #NetworkTraffic #DatabaseTools #DataSecurity
🦈 Wireshark Useful Filters – Quick Guide for Network Pros 🌐
Wireshark is the go-to tool for packet analysis 📡. With the right filters, you can cut through the noise and find exactly what matters 🔎. Here are some of the most useful ones every cybersecurity pro 🛡️ and network engineer ⚙️ should know:
✨ Host & IP Filters
ip.addr == 192.168.1.10 → traffic from/to one host 🖥️
ip.src == 10.0.0.5 → packets from a source 📤
ip.dst == 8.8.8.8 → packets to a destination 📥
✨ Protocol Filters
http → all HTTP traffic 🌍
dns → DNS lookups & responses 🔤
tcp / udp → filter transport layer 📡
✨ Port Filters
tcp.port == 443 → HTTPS 🔒
udp.port == 53 → DNS 📡
tcp.port == 22 → SSH 🔑
✨ Conversation Tracking
tcp.stream eq 5 → follow a single TCP session 🔄
http.request → show only client requests 📤
http.response → show only server responses 📥
✨ Error & Suspicious Activity
tcp.flags.reset == 1 → connection resets ⚠️
icmp → ping/echo packets 🛰️
ssl.handshake → TLS handshakes 🔐
⚠️ Disclaimer:
For educational & authorized use only. Always analyze traffic in labs or systems you manage. 🚫🔒
#Wireshark #PacketAnalysis #CyberSecurity #InfoSec #NetworkSecurity #BlueTeam #NetworkTraffic #TechTools 🦈
Enhance your network diagnostics toolkit: NetHogs offers real-time insights that pinpoint resource-hungry apps. Essential for admins! #NetworkTraffic #LinuxOps https://xt.om/9LtD
After trump sees #eu proposal of 600 mrd as a present .. somebode from @EUCommission should tell HIM .. it was only a classic #joke at the cost of the #dealmaker .
Next will come #tax und #tariffs for digital products and earnings from digital #advertizement . generated #networkTraffic
#gafam has to be paid while making #profit
My favorite pentesting setup.
Today i'm setting up the #KaliLinux #Docker #container for my #ansible #playbook. This setup has some pretty cool advantages for me.
I can:
This has been my favorite #pentesting setup so far for obvious reasons. I can access a fully configured pentesting environment on all my devices, always accessible and ready to go.
In case anyone is interested in the setup, it will be included in my ansible playbook, which will be published on this repository.
Join Anthony Verez at #Honeynet2025 in Prague for a hands-on training that dives into pcap analysis, attack classification, and large-scale metadata extraction. Learn how to use tools like Zeek, Suricata, DuckDB, and even LLMs like ChatGPT to break down malicious traffic patterns and understand real-world threats.
🛠️ Hone your skills in traffic dissection and detection
🪑 Limited seats available – don’t wait!
🔗 Register now: https://prague2025.honeynet.org
Ah, just what we needed: yet another convoluted tool to poke holes in #encryption masquerading as "innovation" 🎩🔍. Now you can snoop on network traffic with all the grace of a bulldozer in a china shop, while GitHub desperately tries to sell you #AI as the solution to all your coding woes 🤖💡.
https://github.com/qpoint-io/qtap #innovation #networktraffic #tools #privacy #HackerNews #ngated
Just posted a new blog: Pete’s Take: Microsegmentation 03: Discovering Traffic Flows. URL: https://www.linkedin.com/pulse/petes-take-microsegmentation-03-discovering-traffic-flows-welcher-bykae/ Tags: #PeterWelcher #CCIE1773 #Microsegmentation #Elisity #Cisco #FlowDiscovery #TrafficAnalytics #NetworkTraffic
Don't mix up #WireShark and #WireGuard: One is for analyzing #networktraffic and the other one is for hiding and encrypting network traffic (besides other things).
And yes, I verbally mix them up often enough even though I know exactly which one does what. Seems to be a #dyslexia thing.
Tom’s Hardware: This Raspberry Pi project visualizes your real-time network traffic in the most beautiful way. “Keeping an eye on your network activity is an important part of network security, but did you ever consider it could be an important element of design? We’re tickled to show off this cool Raspberry Pi art display put together by maker and developer Alex Chang that uses network […]
Need to monitor and diagnose network traffic on Windows? 🌐💻 Learn the best tools and techniques to track, analyze, and troubleshoot your network like a pro! 🚀 #NetworkTraffic #WindowsTips #TechTutorial #Troubleshooting
https://pupuweb.com/how-to-monitor-and-diagnose-windows-network-traffic/
To arrive at their breakthrough, the study researchers combined two prior approaches: the original solution that treated #networks as #traffic; and a later one that instead viewed them as an #ElectricalGrid.
'Absurdly fast' algorithm solves 70-year-old logjam — speeding up #NetworkTraffic in areas from #AirlineScheduling to the #internet
https://www.msn.com/en-us/news/technology/absurdly-fast-algorithm-solves-70-year-old-logjam-speeding-up-network-traffic-in-areas-from-airline-scheduling-to-the-internet/ar-BB1qSRdF?ocid=emmx-mmx-feeds&PC=EMMX01
One example why to use strong #passwords for users who use file sharing over #SMB even when the file transfers are #encrypted.
If the SMB traffic is captured/eavesdropped, then the attacker can try to crack the user password.
The attacker is able to extract challenge/response values from the Session Setup and then use #passwordcracking tools such as #hashcat
If the attack is successful, the attacker will gain not only the access to the user account, but it is also possible to decrypt the captured SMB file transfers. There is lack of perfect forward secrecy in this encryption.
For more details and practical examples, see this blog post:
https://malwarelab.eu/posts/tryhackme-smb-decryption/
#networktrafficanalysis #networktraffic #encryption #netntlmv2 #netntlm #ntlm #windows #fileshare #pentesting #cybersecurity #hardening #password #cracking #offensivesecurity #offsec #blueteam #purpleteam
Recent #TryHackMe room inspired me to publish blog about Decryption of #SMB traffic
Summarized 3 methods of decryption in #Wireshark:
- with user password
- with NTLM hash
- without them, just by cracking the captured #network traffic
https://malwarelab.eu/posts/tryhackme-smb-decryption/
#cryptography #networkanalysis #networktrafficanalysis #networktraffic #samba #encryption
ELLIO and @ntop_org partnership to boost high-speed #networktraffic #monitoring #ntopng with real-time data on opportunistic scans, #botnets, and mass attacks. https://blog.ellio.tech/?p=148 via
@ELLIO
Hello everyone.
In today's article, we learn to listen to our own TCP/UDP packets using the Python socket model.
We wish everyone a good reading and working.
https://denizhalil.com/2024/04/23/python-network-traffic-listener-guide/
#networktraffic #python #programming #socket #sniffing #cybersecurity #networkanalysis
Top 10 #Networking #Tools & Techniques by #ActiveCountermeasures.
I have lot of fun watching this video and there are several useful tips&tricks by Chris and Bill.
Especially recommended to see use cases for #tshark, #tcpdump with #BPF and counting connections per hour from PCAP an #zeek logs
Egal ob KI, Machine Learning (ML), Erweiterte Realität (XR) oder Digital Twins - alle diese Technologien haben etwa gemeinsam: Sie sorgen dafür, dass der Datenverkehr weiter stark zunimmt. Glaubt man dem Global Network Traffic 2030 Report von Nokia, so wird der Datenverkehr zwischen 2022 und 2030 mit einer durchschnittlichen jährlichen Wachstumsrate (CAGR) von 22 bis 25 Prozent zunehmen. (https://www.cio.de/) #NetworkTraffic https://www.computerwoche.de/a/so-veraendern-ki-und-cloud-die-netze,3697937