#networktraffic

2025-09-18

🦈 Wireshark Useful Filters – Quick Guide for Network Pros 🌐

Wireshark is the go-to tool for packet analysis 📡. With the right filters, you can cut through the noise and find exactly what matters 🔎. Here are some of the most useful ones every cybersecurity pro 🛡️ and network engineer ⚙️ should know:

✨ Host & IP Filters
ip.addr == 192.168.1.10 → traffic from/to one host 🖥️
ip.src == 10.0.0.5 → packets from a source 📤
ip.dst == 8.8.8.8 → packets to a destination 📥

✨ Protocol Filters
http → all HTTP traffic 🌍
dns → DNS lookups & responses 🔤
tcp / udp → filter transport layer 📡

✨ Port Filters
tcp.port == 443 → HTTPS 🔒
udp.port == 53 → DNS 📡
tcp.port == 22 → SSH 🔑

✨ Conversation Tracking
tcp.stream eq 5 → follow a single TCP session 🔄
http.request → show only client requests 📤
http.response → show only server responses 📥

✨ Error & Suspicious Activity
tcp.flags.reset == 1 → connection resets ⚠️
icmp → ping/echo packets 🛰️
ssl.handshake → TLS handshakes 🔐

⚠️ Disclaimer:
For educational & authorized use only. Always analyze traffic in labs or systems you manage. 🚫🔒

#Wireshark #PacketAnalysis #CyberSecurity #InfoSec #NetworkSecurity #BlueTeam #NetworkTraffic #TechTools 🦈

xTom :verified:xtom@xtom.social
2025-09-13

Enhance your network diagnostics toolkit: NetHogs offers real-time insights that pinpoint resource-hungry apps. Essential for admins! #NetworkTraffic #LinuxOps xt.om/9LtD

2025-09-12

Die geblockten DNS Anfragen in meinem #pihole sind von >30% der Anfragen auf unter 8% der Anfragen gesunken seit wir @murena #eOS auf unseren Telefonen haben.
e/OS/ blockt da schon ganz schön was weg, da sind nur noch ein paar CDNs die von Pihole zusätzlich weggefiltert werden.

#NetworkTraffic #security

2025-08-06

After trump sees #eu proposal of 600 mrd as a present .. somebode from @EUCommission should tell HIM .. it was only a classic #joke at the cost of the #dealmaker .
Next will come #tax und #tariffs for digital products and earnings from digital #advertizement . generated #networkTraffic
#gafam has to be paid while making #profit

aaron ~# :blinkingcursor:neuroexception@infosec.exchange
2025-05-17

My favorite pentesting setup.

Today i'm setting up the #KaliLinux #Docker #container for my #ansible #playbook. This setup has some pretty cool advantages for me.

I can:

  • access the shell and files using #SSH and #SFTP.
  • customize the installation to the fullest extend using the #Dockerfile.
  • easily route the #networktraffic through a #vpn using #gluetun.
  • reproduce the setup (i love Docker).
  • use GUI apps from that container using X11Forwarding or by installing a #vnc server.

This has been my favorite #pentesting setup so far for obvious reasons. I can access a fully configured pentesting environment on all my devices, always accessible and ready to go.

In case anyone is interested in the setup, it will be included in my ansible playbook, which will be published on this repository.

#automation #linux #hacking #x11 #homelab #selfhosting

Stratosphere Research Laboratorystratosphere@infosec.exchange
2025-05-16

Join Anthony Verez at #Honeynet2025 in Prague for a hands-on training that dives into pcap analysis, attack classification, and large-scale metadata extraction. Learn how to use tools like Zeek, Suricata, DuckDB, and even LLMs like ChatGPT to break down malicious traffic patterns and understand real-world threats.

🛠️ Hone your skills in traffic dissection and detection
🪑 Limited seats available – don’t wait!
🔗 Register now: prague2025.honeynet.org

#PCAPAnalysis #NetworkTraffic #Zeek

N-gated Hacker Newsngate
2025-05-08

Ah, just what we needed: yet another convoluted tool to poke holes in masquerading as "innovation" 🎩🔍. Now you can snoop on network traffic with all the grace of a bulldozer in a china shop, while GitHub desperately tries to sell you as the solution to all your coding woes 🤖💡.
github.com/qpoint-io/qtap

Axel ⌨🐧🐪🚴😷☕️ | #WeAreNatenomxtaran@chaos.social
2025-02-05

Don't mix up #WireShark and #WireGuard: One is for analyzing #networktraffic and the other one is for hiding and encrypting network traffic (besides other things).

And yes, I verbally mix them up often enough even though I know exactly which one does what. Seems to be a #dyslexia thing.

#deformationProfessionnelle

2025-01-03

Tom’s Hardware: This Raspberry Pi project visualizes your real-time network traffic in the most beautiful way. “Keeping an eye on your network activity is an important part of network security, but did you ever consider it could be an important element of design? We’re tickled to show off this cool Raspberry Pi art display put together by maker and developer Alex Chang that uses network […]

https://rbfirehose.com/2025/01/03/toms-hardware-this-raspberry-pi-project-visualizes-your-real-time-network-traffic-in-the-most-beautiful-way/

PUPUWEB Blogpupuweb
2024-11-21

Need to monitor and diagnose network traffic on Windows? 🌐💻 Learn the best tools and techniques to track, analyze, and troubleshoot your network like a pro! 🚀

pupuweb.com/how-to-monitor-and

Norobiik @Norobiik@noc.socialNorobiik@noc.social
2024-08-25

To arrive at their breakthrough, the study researchers combined two prior approaches: the original solution that treated #networks as #traffic; and a later one that instead viewed them as an #ElectricalGrid.

#Algorithms

'Absurdly fast' algorithm solves 70-year-old logjam — speeding up #NetworkTraffic in areas from #AirlineScheduling to the #internet
msn.com/en-us/news/technology/

2024-08-16

One example why to use strong #passwords for users who use file sharing over #SMB even when the file transfers are #encrypted.
If the SMB traffic is captured/eavesdropped, then the attacker can try to crack the user password.
The attacker is able to extract challenge/response values from the Session Setup and then use #passwordcracking tools such as #hashcat

If the attack is successful, the attacker will gain not only the access to the user account, but it is also possible to decrypt the captured SMB file transfers. There is lack of perfect forward secrecy in this encryption.

For more details and practical examples, see this blog post:

malwarelab.eu/posts/tryhackme-

#networktrafficanalysis #networktraffic #encryption #netntlmv2 #netntlm #ntlm #windows #fileshare #pentesting #cybersecurity #hardening #password #cracking #offensivesecurity #offsec #blueteam #purpleteam

extraction of challenge/response parameters from the pcap with tsharkcracking password with hashcat, example of dictionary attack against NetNTLMv2NT Password in Wireshark NTLMSSP protocol preferencesDecrypted SMB traffic
2024-08-14

Recent #TryHackMe room inspired me to publish blog about Decryption of #SMB traffic

Summarized 3 methods of decryption in #Wireshark:
- with user password
- with NTLM hash
- without them, just by cracking the captured #network traffic

malwarelab.eu/posts/tryhackme-

#cryptography #networkanalysis #networktrafficanalysis #networktraffic #samba #encryption

ELLIO TechnologyELLIO@infosec.exchange
2024-05-29

ELLIO and @ntop_org partnership to boost high-speed #networktraffic #monitoring #ntopng with real-time data on opportunistic scans, #botnets, and mass attacks. blog.ellio.tech/?p=148 via
@ELLIO

halil denizhalildeniz
2024-04-23

Hello everyone.
In today's article, we learn to listen to our own TCP/UDP packets using the Python socket model.

We wish everyone a good reading and working.
denizhalil.com/2024/04/23/pyth

2024-03-25

Top 10 #Networking #Tools & Techniques by #ActiveCountermeasures.

I have lot of fun watching this video and there are several useful tips&tricks by Chris and Bill.
Especially recommended to see use cases for #tshark, #tcpdump with #BPF and counting connections per hour from PCAP an #zeek logs

youtube.com/watch?v=0I6W175cUQ

#networkanalysis #networktraffic #networkforensics

DigitalNaiv = Stefan PfeifferDigitalNaiv
2023-11-23

Egal ob KI, Machine Learning (ML), Erweiterte Realität (XR) oder Digital Twins - alle diese Technologien haben etwa gemeinsam: Sie sorgen dafür, dass der Datenverkehr weiter stark zunimmt. Glaubt man dem Global Network Traffic 2030 Report von Nokia, so wird der Datenverkehr zwischen 2022 und 2030 mit einer durchschnittlichen jährlichen Wachstumsrate (CAGR) von 22 bis 25 Prozent zunehmen. (cio.de/) computerwoche.de/a/so-veraende

Juan-Pablo Paredesjpp4redes
2023-11-05

La diferencia entre el tráfico de de y es como la de un goteo controlado frente a una inundación apocalíptica 😱😁🚰🐧🪣

Comparación del tráfico de red de Linux con un grifo cerrado que gotea y el de Windows con una cañería de distribución de agua totalmente abierta vaciando su inmenso contenido a un río

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst