Live stream sniffed packets from your @mikrotik router to #NetworkMiner with #TZSP
https://netresec.com/?b=2459ed5
Remote Sniffing from Mikrotik Routers

One of the new features in NetworkMiner 2.9 is a TZSP streaming server. It is designed to read a real-time stream of sniffed packets from Mikrotik routers. This method for remote sniffing can be used to capture packets regardless if NetworkMiner is running in Windows or Linux. How to Sniff Packets w[...]

Netresec
NetworkMiner - I have just completed this room! Check it out: https://tryhackme.com/room/networkminer #tryhackme #NetworkMiner #Traffic analysis #Network forensics #pcap #Intrusion #Detection #forensics #networkminer via @RealTryHackMe
TryHackMe | Cyber Security Training

TryHackMe is a free online platform for learning cyber security, using hands-on exercises and labs, all through your browser!

TryHackMe
#NetworkMiner 2.8 is out!
๐Ÿ–ฅ๏ธ Improved user interface
๐Ÿ‘ท Better IEC-104 support
๐Ÿ“ฆ CAPWAP decapsulation
๐Ÿ“ง Port-independent detection of SMTP
๐Ÿงฆ Port-independent detection of SOCKS
https://netresec.com/?b=231d523
NetworkMiner 2.8 Released

I am happy to announce the release of NetworkMiner 2.8 today! This new version comes with an improved user interface, better parsing of IEC-104 traffic and decapsulation of CAPWAP traffic. The professional edition of NetworkMiner additionally adds port-independent detection of SMTP and SOCKS traffic[...]

Netresec
#NetworkMiner is now available as a package in FLARE VM
https://netresec.com/?b=22C2c77
NetworkMiner in FLARE VM

NetworkMiner is now available as a package in the reverse engineering platform FLARE VM. You can either select the networkminer.vm package in the installer or install NetworkMiner later on from the command line. NetworkMiner can be installed in FLARE VM from an admin shell by running choco install n[...]

Netresec

Extracting a #CobaltStrike beacon config from #PCAP in 5 simple steps:
๐Ÿšœ #CapLoader
โ›๏ธ #NetworkMiner
โŒจ๏ธ cmd.exe
๐Ÿ 1768 K
๐Ÿฆนโ€โ™‚๏ธ Cobalt Strike Beacon Config

Full video, writeup and link to pcap file is available here:
https://netresec.com/?b=21536fc

Detecting Cobalt Strike and Hancitor traffic in PCAP

This video shows how Cobalt Strike and Hancitor C2 traffic can be detected using CapLoader. Your browser does not support the video tag. I bet you're going: ๐Ÿ˜ฑ OMG he's analyzing Windows malware on a Windows PC!!! Relax, I know what I'm doing. I have also taken the precaution of analyzing the PCAP f[...]

Netresec