asteroza + packet   139

Shooting Rubber Bands At Firewalls
Uh, if this is correct, there will be some unhappy campers in in the small/medium business space...
firewall  DDoS  TCP  garbage  packet  security  hacking  pentesting 
may 2019 by asteroza
Packet Total
Like VirusTotal, for analyzing malicious PCAP's that may be targeting analysis tools.
security  network  packet  capture  PCAP  scanning  Delicious 
february 2017 by asteroza
WPO-Foundation/win-shaper: Windows traffic-shaping packet filter
Similar to the comcast network emulator, making your network suck at customizable levels
network  traffic  simulator  packet  shaper  control  windows  Delicious 
january 2017 by asteroza
Using the Decryption Feature for TLS, SSL, and RDP
If you use a MitM local proxy that doesn't export data (less suspicious, looks like an antivirus scanner), then load the MitM cert into Message Analyzer, you can see stuff without being too suspicious. Still need to load the cert in the CA store though...
windows  packet  capture  message  analyzer  SSL  TLS  encryption  decryption  sysadmin  tools  utilities  security  hacking  pentesting  Delicious 
june 2016 by asteroza
iptables -t filter -A INPUT -p udp --sport 53 -m connbytes --connbytes 512 --con... | Hacker News
Possible mitigation, but might need to range 512: and the TCP rule might need to change to start from 1024
cve-2015-7547  glibc  security  mitigation  iptables  firewall  rule  oversize  DNS  packet  filter  Delicious 
february 2016 by asteroza
kdzwinel/betwixt
Interesting extension to Chrome, to monitor web traffic not passing through Chrome but be able to use Chrome debugging tools. Effectively a bridge to a local MitM proxy though.
web  HTTP  traffic  proxy  analysis  analyzer  software  network  debugging  chrome  browser  addon  plugin  extension  packet  sniffer  programming  development  webdev  sysadmin  tips  tricks  Delicious 
december 2015 by asteroza
Win10Pcap - WinPcap for Windows 10
Proper windows 10 support via NDIS6 and real EV SHA-2 signed driver, and is drop in compatible (as long as you aren't directly calling npf.sys). But GPL licensing may be a problem...
NDIS6  winpcap  packet  capture  library  software  windows  security  Delicious 
july 2015 by asteroza
www.wawtechnologies.com
You want to talk about a bump in the wire? THIS IS a bump in the wire. PoE passthru pentest dropbox.
LUNA  inline  security  pentest  pentesting  hardware  electronics  devices  PoE  passthru  dropbox  packet  sniffing  capture  MitM  hacking  Delicious 
december 2014 by asteroza
LTE Direct Research Project
So a bad mix between ham radio and iBeacons, but you can't randomize your MAC address (IMEI) so you are always identifiable. Won't work for protest situations as a carrier can functionally prohibit by disabling authorization for spectrum. Might be nice for disasters to form mesh networks assuming the authorization infrastructure survives.
LTEdirect  LTE  direct  local  p2p  packet  radio  protocol  communications  infrastructure  security  mesh  network  Delicious 
september 2014 by asteroza
draft-kirsch-ietf-tcp-stealth-00
based on the Knock kernel patch for TCP SYN packet SQN based port knocking tokens.
IETF  draft  RFC  TCP  stealth  port  knocking  SYN  packet  SQN  security  network  protocol  Delicious 
august 2014 by asteroza
Phys. Rev. Lett. 109, 244801 (2012): Can a Metal Surface Repel Electric Charges?
Basically, a long cylinder shaped charge packet traveling fast enough is repelled from surrounding materials (including conductive metals) if it is traveling fast enough oriented along the long axis. Which basically means accelerator design improvements to reduce required hardware may be possible.
accelerator  repulsion  packet  charge  research  physics  particle  Delicious 
january 2013 by asteroza
ITU-T Work Programme
Y.2770 is a DPI spec from the ITU for national or provider level deep packet inspection and surveillance of network traffic. Basically it's an attempt at standardizing the surveillance tools of police states, arguably to make it cheaper to implement. It's things like this that make a UN/ITU internet takeover look worse than the alternative (leaving the US in charge). Naturally, promoted by Russia, China, and a number of middle eastern states...
internet  politics  anonymity  privacy  evil  standard  surveillance  monitoring  network  DPI  inspection  packet  deep  Y.2770  ITU  Delicious 
december 2012 by asteroza
Packetloop
Um, this is only feasible if 1. you have at least double the peak bandwidth available to upload as you are actually using and 2. you have oodles of money to pay for the kind of storage this would need. Because in the age of gigabit networks, full packet recording would be painful. But if you can pull it off, wow, talk about the ultimate network forensic box...
IDS  DPI  service  analysis  forensic  storage  packet  network  Delicious 
november 2012 by asteroza
プレスリリース | 対サイバー攻撃アラートシステム “DAEDALUS”(ダイダロス)の外部展開を開始! | NICT-独立行政法人 情報通信研究機構
Network monitoring system keeping an eye on darknets and bogon IP spaces for virus activity, then visualizing it. Seems NICTER has been doing neat visualizations of this stuff for a while, but this new version has a big "Ghost in the Shell" or "GITS:SAC" feel to it.
japan  NICT  NICTER  DAEDALUS  Nirvana  network  traffic  darknet  packet  sniffing  monitoring  system  GITS  GITS:SAC  DDoS  virus  attack  visualization  infoviz  UI  GUI  design 
june 2012 by asteroza
Lossless Gigabit Remote Packet Capture With Linux
Does a few simple tricks to up performance and not drop packets, like splitting network access from disk I/O into separate threads on different CPU's. Dude thinks the performance increase for packets over 300 in size is both big, and could additionally benefit from the PF_RING kernel patch.
gulp  high  speed  remote  multithreaded  ring  buffer  packet  capture  software  network  analysis  Delicious 
january 2012 by asteroza
AntiCredit - Android Market
Apparently you have to buy credits to use the Anti android app, via this app.
zImperium  ANTI  android  network  attack  scanning  toolkit  security  hacking  software  pentest  tools  utilities  android  app  software  packet  capture  Delicious 
october 2011 by asteroza
Kitchens of India - Feast for Senses | A culinary journey through India
supposedly make packets of indian food that taste good and are microwavable in 2 minutes...
food  prepackaged  packet  sachet  india  indian  curry  cooking  recipe  Delicious 
november 2010 by asteroza
10/100/1000 Base-T, NuDOG-301C of Taiwan Xtramus
Oh, new gigabit version of the USB connected and powered ethernet tap! Must have...
NuDog  USB  powered  10Mbps  100Mbps  1000Mbps  10Mbit  100Mbit  gigabit  ethernet  network  tap  packet  capture  monitoring  sniffing  sniffer  tools  Delicious 
september 2010 by asteroza
Dualcomm Technology - USB Powered 5-Port 10/100/1000 Gigabit Ethernet Switch with Port Mirroring and PoE Pass-Through
A semi-portable USB powered gigabit switch with port mirroring for sniffing a live connection. Still needs a separate network card for the actual packet capture (I suppose you could use the normal laptop network port...)
Dualcomm  ethernet  10Mbps  100Mbps  1000Mbps  10Mbit  100Mbit  gigabit  port  mirror  switch  USB  powered  network  monitoring  packet  sniffing  tools  hardware  electronics  devices  breakout  tap  Delicious 
september 2010 by asteroza
Asiajin » Japanese Government Allows ISPs to Target Ads by Browsing History
Ah, so this is the carrot to the Child Porn ban stick. Getting the ISP's, who do not want to be turned into dumb data pipe providers and lose their margins, to install the necessary DPI hardware/software stack to do targeted ad injection, will mean they have the necessary and requisite infrastructure for the Child Porn firewall the NPA so desperately wants (which is partially a front for the infrastructure to suppress websites the government doesn't like). Where there is potential for profit, the ISP's will bite, otherwise they would never pay for the massive firewall infrastructure. Phorm and NebuAd were bad enough., but this is getting ready to kick it up a notch.
japan  DPI  ad  targeting  ISP  traffic  monitoring  packet  inspection  privacy  security  anonymity  Delicious 
may 2010 by asteroza
« earlier      
per page:    204080120160

related tags

2.4  2G  3d  3G  4G  10.7  10Mbit  10Mbps  100Mbit  100Mbps  802.11  1000Mbps  accelerator  access  accesspoint  ad  adapter  addon  advertising  alternative  analysis  analytics  analyzer  android  anonymity  antenna  ANTI  anti-p2p  antip2p  app  appliance  application  arp  ArpSpyX  array  art  asterisk  attack  attention  audio  auditing  auralization  authentication  authorization  bandwdith  bandwidth  behaviour  beta  bit  Bit-Twist  blackhole  blocking  blog  bluetooth  breakout  browser  BSOD  buffer  C#  C++  CALEA  call  capture  capturing  Carnivore  carnivorePE  carrier  case  Catapulta  cellphone  cGrid  channel  chaosreader  charge  chart  checksum  chrome  Cisco  classic  classifier  CLI  client  cloud  Clouseau  collaboration  collector  command  communication  communications  compliance  concept  connection  consumer  control  converter  cookie  cookies  cooking  corruption  covert  crafted  cryptography  cube  cube-of-doom  curry  cve-2015-7547  DAEDALUS  daemonlogger  darknet  data  database  DDoS  debian  debugging  decryption  deep  defense  Delicious  design  detection  development  devices  diagnostic  diagram  DiffProbe  direct  distribution  distro  diversion  DLL  DNS  doom  DPI  draft  dragnet  Driftnet  driver  dropbox  Dualcomm  Echo  EDS  elasticsearch  electronics  Ellacoya  encryption  endpoint  EPS  error  ESXi  etercap  ethereal  ethernet  EtherPEG  EtherShark  ethical  ETL  Ettercap  Eve  event  evil  exfiltration  extension  external  extrusion  ferret  file  filetype:png  filter  filtering  firefox  firesheep  firewall  flash  flat  flow  flowchart  Fluke  food  forensic  forensics  forwarding  framework  FreeBSD  freeware  FTP  full  fusion  fuzzer  fuzzing  fwknop  garbage  gateway  general  generator  GIF  gigabit  GITS  GITS:SAC  glibc  go  google  GPGPU  GPL  GPU  graph  graphing  GUI  guide  gulp  H.323  hacking  handling  hardware  high  hijack  honeypot  hook  hooking  howto  http  humor  identification  IDS  IETF  IM  image  india  indian  information  infosec  infoviz  infrastructure  injection  inline  inspection  install  installless  intel  intercept  interception  interface  internet  IP  ipoque  IPS  iptables  IPV4  IRC  irregularity  ISP  ITU  japan  java  JPEG  kafka  kernel  key  keylogger  knocking  L7  Lambda  LAN  layer  leakge  learning  libpcap  library  line  linux  lion  list  live  LiveCD  local  logging  login  long  lookingglass  LTE  LTEdirect  LUNA  M-Lab  mac  machine  magic  malformed  management  manipulation  map  mapping  matching  Matriux  Mbps  measurement  media:image  mesh  message  metrics  microsoft  midi  Mirage  mirror  mitigation  MITM  MitM  mobile  modified  moloch  monitor  monitoring  MPEG  multithreaded  music  Narus  NarusInsight  NDIS6  NebuAd  nertwork  net  Netcosm  NetCube  netfilter  netflow  NetMon  netowrk  NetQoS  NetWitness  network  networking  NetworkMiner  Networks  neutrality  news  NICT  NICTER  Nirvana  nmap  NOC  Npcap  NSM  NuDog  obfuscated  obstcp  of  online  OpenCALEA  openFPC  opensource  opportunistic  OptiView  ordering  OSC  osx  oversize  P-Cube  p2p  packet  packetgarden  PacketShader  packit  parser  particle  passing  passthru  patch  pcap  pcapr  penetration  pentest  pentesting  performance  PF_RING  phone  physics  ping  plaintext  plan  platform  player  plugin  PoE  poisoning  politics  POP3  port  portable  powered  powershell  PPC  prepackaged  prevention  privacy  private  problem  processing  profiler  profiling  programming  protection  protocol  proxy  PVR  python  QoS  qualcomm  radio  range  rate  realtime  reassembler  recipe  recorder  recording  Red  redirect  redirection  reference  remote  replay  repository  repulsion  research  RF  RFC  RFC3514  ring  ringmap  rlogin  rolling  router  routing  RTP  rtpbreak  rule  RUMINT  sachet  SafeMedia  sancp  scanning  scapy  screensaver  searching  secret  sector  secuirty  security  seepage  sender  sensor  server  service  session  setup  shaper  shaping  sharing  SharpPcap  sidejacking  SIM  simulation  simulator  single  SIP  skype  SMTP  sniffer  sniffing  SNORT  Softbank  software  sonification  sound  SPA  speed  spinning  spoofing  SQN  squid  SSL  stack  standalone  standard  state  stealth  steganography  stetho  storage  stream  streamline  string  study  subscription  subsystem  surveillance  switch  switched  SYN  synthesizer  sysadmin  sysamin  system  table  tap  tapping  targeted  targeting  tcp  telephony  telnet  testing  theft  throughput  timing  tips  TLS  toolkit  tools  TPROXY  trace  tracing  tracking  traffic  training  transparent  tricks  trigger  troubleshooting  ubuntu  UCsniff  udp  UI  unlock  USB  use  user  usermode  utilities  vector  viewer  violation  virus  visualization  vmnet-sniffer  VMware  VNC  VoIP  VPP  WakeonLAN  wallofsheep  WAND  web  webdev  webfilter  website  widows  wifi  windows  winpcap  WinPcapNET  wireless  wireshark  wiretap  wiretapping  WoL  workstation  WPA  wrapper  X11  Xirrus  XP  Y.2770  zImperium 

Copy this bookmark:



description:


tags: