nrw.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Wir sind eine freundliche Mastodon Instanz aus Nordrhein-Westfalen. Ob NRW'ler oder NRW-Sympathifanten, jeder ist hier willkommen.

Serverstatistik:

2,8 Tsd.
aktive Profile

#tshark

0 Beiträge0 Beteiligte0 Beiträge heute
J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF:<p>During a recent change management call, one of the app teams was talking about running Wireshark on their four app servers to capture an elusive authentication timeout event. They would have to filter for all traffic coming and going to all 16 of our domain controllers and were expecting to run it for up to 24 hours.<br>The networking team lead immediately spoke up and told them that would probably fill their hard drives and use all their RAM and they should probably rethink it.<br>The app team admitted they had no experience with Wireshark and were just following the advice of their vendor's tech support.<br>I asked them why they didn't just use <code>tshark</code> or <code>dumpcap</code> which is how I got roped into helping them with their change.<br>I was able to step in and help them use <code>dumpcap</code> instead of Wireshark. I built them a command that would create 50 MB pcap files and stop when it hit a total file count that was the equivalent to half of the available disk space (each server had the same amount of free space on the secondary drive).<br>I was proud of myself for being able to leverage the shit I've learned OTJ and via my SANS GIAC certifications.<br>It was a little thing, but it saved them a lot of trouble and possibly crashing their servers.<br>It's nice when teams can work together.</p><p><a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/Wireshark" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireshark</span></a> <a href="https://infosec.exchange/tags/tshark" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tshark</span></a> <a href="https://infosec.exchange/tags/dumpcap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dumpcap</span></a> <a href="https://infosec.exchange/tags/SANS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SANS</span></a> <a href="https://infosec.exchange/tags/GIAC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GIAC</span></a></p>
nickbearded<p>From day one, TShark has been an essential part of <a href="https://mastodon.social/tags/BashCore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BashCore</span></a>. It’s not just a substitute for Wireshark—it’s the same powerful engine, but fully command-line. If you’re serious about network analysis and pentesting, mastering TShark is a must.</p><p>It has nothing less than Wireshark, just no GUI. Learn it, and you’ll have full control over packet capture and analysis, even on minimal systems.</p><p><a href="https://www.wireshark.org/docs/man-pages/tshark.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wireshark.org/docs/man-pages/t</span><span class="invisible">shark.html</span></a></p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/Networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Networking</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/TShark" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TShark</span></a> <a href="https://mastodon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://mastodon.social/tags/NoGUI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NoGUI</span></a></p>
Wireshark<p>Dive into SharkFest'25 US with these must-attend sessions:</p><p>• Are You Ready for Post Quantum Encryption? (Larry Greenblatt)<br>• New kid on the block: Stratoshark (Sake Blok)<br>• Sharkmon - Packet Monitoring using Tshark (Andreas Diedrich)</p><p>Join us at SharkFest'25 US to deepen your network analysis skills and connect with industry experts!</p><p><a href="https://sharkfest.wireshark.org/sfus" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sharkfest.wireshark.org/sfus</span><span class="invisible"></span></a></p><p><a href="https://ioc.exchange/tags/Wireshark" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireshark</span></a> <a href="https://ioc.exchange/tags/Stratoshark" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Stratoshark</span></a> <a href="https://ioc.exchange/tags/sf25us" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sf25us</span></a> <a href="https://ioc.exchange/tags/SharkFest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SharkFest</span></a> <a href="https://ioc.exchange/tags/Tshark" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tshark</span></a></p>
Gonçalo Ribeiro<p>My <a href="https://infosec.exchange/tags/MSMQ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSMQ</span></a> <a href="https://infosec.exchange/tags/honeypot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>honeypot</span></a> is extreeeemly advanced 😆​</p><p>`ncat -vlkp 1801 &gt; /dev/null -c 'cat msmq.out.raw'`</p><p>Then a <a href="https://infosec.exchange/tags/tshark" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tshark</span></a> capturing the traffic.</p><p><a href="https://infosec.exchange/tags/QueueJumper" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QueueJumper</span></a></p>