AyaFlow: A high-performance, eBPF-based network traffic analyzer written in Rust
https://github.com/DavidHavoc/ayaFlow
#HackerNews #AyaFlow #eBPF #Rust #NetworkTraffic #Analyzer #HighPerformance #OpenSource
AyaFlow: A high-performance, eBPF-based network traffic analyzer written in Rust
https://github.com/DavidHavoc/ayaFlow
#HackerNews #AyaFlow #eBPF #Rust #NetworkTraffic #Analyzer #HighPerformance #OpenSource
Elephantshark, a tool to monitor Postgres network traffic
https://neon.com/blog/elephantshark-monitor-postgres-network-traffic
#HackerNews #Elephantshark #Postgres #Monitoring #NetworkTraffic #DatabaseTools #DataSecurity
🦈 Wireshark Useful Filters – Quick Guide for Network Pros 🌐
Wireshark is the go-to tool for packet analysis 📡. With the right filters, you can cut through the noise and find exactly what matters 🔎. Here are some of the most useful ones every cybersecurity pro 🛡️ and network engineer ⚙️ should know:
✨ Host & IP Filters
ip.addr == 192.168.1.10 → traffic from/to one host 🖥️
ip.src == 10.0.0.5 → packets from a source 📤
ip.dst == 8.8.8.8 → packets to a destination 📥
✨ Protocol Filters
http → all HTTP traffic 🌍
dns → DNS lookups & responses 🔤
tcp / udp → filter transport layer 📡
✨ Port Filters
tcp.port == 443 → HTTPS 🔒
udp.port == 53 → DNS 📡
tcp.port == 22 → SSH 🔑
✨ Conversation Tracking
tcp.stream eq 5 → follow a single TCP session 🔄
http.request → show only client requests 📤
http.response → show only server responses 📥
✨ Error & Suspicious Activity
tcp.flags.reset == 1 → connection resets ⚠️
icmp → ping/echo packets 🛰️
ssl.handshake → TLS handshakes 🔐
⚠️ Disclaimer:
For educational & authorized use only. Always analyze traffic in labs or systems you manage. 🚫🔒
#Wireshark #PacketAnalysis #CyberSecurity #InfoSec #NetworkSecurity #BlueTeam #NetworkTraffic #TechTools 🦈
My favorite pentesting setup.
Today i'm setting up the #KaliLinux #Docker #container for my #ansible #playbook. This setup has some pretty cool advantages for me.
I can:
This has been my favorite #pentesting setup so far for obvious reasons. I can access a fully configured pentesting environment on all my devices, always accessible and ready to go.
In case anyone is interested in the setup, it will be included in my ansible playbook, which will be published on this repository.
Join Anthony Verez at #Honeynet2025 in Prague for a hands-on training that dives into pcap analysis, attack classification, and large-scale metadata extraction. Learn how to use tools like Zeek, Suricata, DuckDB, and even LLMs like ChatGPT to break down malicious traffic patterns and understand real-world threats.
🛠️ Hone your skills in traffic dissection and detection
🪑 Limited seats available – don’t wait!
🔗 Register now: https://prague2025.honeynet.org
Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections and their originating processes. - qpoint-io/qtap
This is the third blog in my series about Microsegmentation, using Elisity’s product (and training/other graphics) to make key points. This blog covers discovering traffic flows, and the powerful tools built into the Elisity GUI to help you do that, also serving to help you build policy.
Don't mix up #WireShark and #WireGuard: One is for analyzing #networktraffic and the other one is for hiding and encrypting network traffic (besides other things).
And yes, I verbally mix them up often enough even though I know exactly which one does what. Seems to be a #dyslexia thing.
Tom’s Hardware: This Raspberry Pi project visualizes your real-time network traffic in the most beautiful way. “Keeping an eye on your network activity is an important part of network security, but did you ever consider it could be an important element of design? We’re tickled to show off this cool Raspberry Pi art display put together by maker and developer Alex Chang that uses network […]