Skip to content
CyberOpsSec
CyberOpsSec

Just another cybersecurity site

  • Home
  • Posts
  • Knowledge
    • Auditing
    • Linux Commands
    • Ports & Protocols
    • Scanning
    • Sniffing
    • Syslog
    • Vulnerability/Patch Mgmt
  • About
  • Contact
CyberOpsSec

Just another cybersecurity site

Sniffing

Wireshark

Analyze -> Expert Info to see all the traffic patterns. You could record traffic for 5x minutes. A high number of RSTS would be bad such as 100+.
Statistics -> Flow Graph and limit it to a filter, to see port scans
Statistics -> Protocol Hierarchy can show you which protocols are on your network and generating the most bandwidth
Statistics -> Conversation can view the 5-tuple

Example Filters

  • !(ip.dst == 192.168.1.0/24) && !(ip.dst == 192.168.2.0/24) && !(ip.dst == 192.168.3.0/24) && !(ip.dst == 192.168.4.0/24) && !arp && !llmnr && !dhcp
  • -tcp.flags.reset==1
  • -http.request
  • -tcp contains hacker
  • -!(arp or icmp or dns)
  • -tcp.analysis.retransmission
  • -frame.time >= “Jul 18, 2019 16:40:00” && frame.time <= “Jul 18, 2019 16:41:59” && frame contains “test”
  • frame contains “paypal”

To view encrypted packets:

@echo off
set SSLKEYLOGFILE=c:\temp\TLS_KeyLogFile.log
start firefox

PKTMON

c:\windows\system32\pktmon.exe start –capture -f c:\temp\pktmon.etl
(optional) pktmon filter add -i IPAddr -t tcp syn (optional)
pktmon stop
pktmon etl2pcap C:\pktmon.etl –out c:\test.pcapng

Recent Posts

  • UBI – User Browsing Isolation
  • Rolling KRBTGT Account
  • SentinelOne: Why it’s important to monitor and audit your EPP
  • Nessus False Positive
  • Uninstall Vulnerable Software Remotely

Recent Comments

No comments to show.

Archives

  • November 2024
  • September 2024
  • June 2024
  • May 2024
  • March 2024
  • January 2024
  • November 2023
  • September 2023

Categories

  • EPP
  • Uncategorized
  • Vulnerabilities
©2025 CyberOpsSec | WordPress Theme by SuperbThemes