[SANS ISC] Truncating Payloads and Anonymizing PCAP files

I published the following diary on isc.sans.org: “Truncating Payloads and Anonymizing PCAP files“: Sometimes, you may need to provide PCAP files to third-party organizations like a vendor support team to investigate a problem with your network. I was looking for a small tool to anonymize network traffic but also to

[The post [SANS ISC] Truncating Payloads and Anonymizing PCAP files has been first published on /dev/random]

Continue reading [SANS ISC] Truncating Payloads and Anonymizing PCAP files

[SANS ISC] Comment your Packet Captures!

I published the following diary on isc.sans.org: “Comment your Packet Captures!“: When you are investigating a security incident, a key element is to take notes and to document as much as possible. There is no “best” way to take notes, some people use electronic solutions while others are using good

[The post [SANS ISC] Comment your Packet Captures! has been first published on /dev/random]

Continue reading [SANS ISC] Comment your Packet Captures!

[SANS ISC] The easy way to analyze huge amounts of PCAP data

I published the following diary on isc.sans.org: “The easy way to analyze huge amounts of PCAP data“. When you are investigating a security incident, there are chances that, at a certain point, you will have to dive into network traffic analysis. If you’re lucky, you’ll have access to a network capture.

[The post [SANS ISC] The easy way to analyze huge amounts of PCAP data has been first published on /dev/random]

Continue reading [SANS ISC] The easy way to analyze huge amounts of PCAP data