Wednesday, July 10, 2024

from the web; nmap-did-what

 

I stumbled across this Dashboard that I thought you folks might find interesting.



nmap-did-what is a Grafana docker container and a Python script to parse Nmap XML output to an SQLite database. The SQLite database is used as a datasource within Grafana to view the Nmap scan details in a dashboard.

Full Tutorial is available here - Nmap Dashboard using Grafana

Monday, July 8, 2024

Baselining DNS Response Script and Wireshark Statistics


 Since people have expressed interest in more of the following:

-          No nonsense short videos

-          Explanations on how to do things

-          More baselining examples

-          More script examples


I decided to combine them all into one video that is still under 5 minutes.

In this example, I baselined how close to wire speed my PowerShell DNS response script is.

I also show you where in Wireshark it reports DNS response time and cover how accurate it is.


Enjoy

For those of you who want the powershell script, here you go.  Please don’t ask for powershell support, you are on your own. 😉



Friday, July 5, 2024

Using Wireshark to Solve a Video Streaming Problem


 I constantly find opportunities to keep my Wireshark and protocol analysis skills sharp. I would say that about 25% of the time capturing packets didn’t help find or solve the problem, but going through that process is vey important. I have heard many say Wireshark didn’t help at all with problem xyz..  I would counter that statement by explaining that determining which tool to use when troubleshooting is a pretty important skill to develop.

In this example we were trying to determine how an IP camera was streaming to the NVR.  Trust me it wasn’t obvious at all.

I will leave it at that and let you enjoy the video.



Wednesday, July 3, 2024

Kali - First Capture and File Management

 I appreciate all the feedback regarding my last 2 Kali videos. I have been told that people wanted to try KALI/Wireshark but weren’t too familiar with Linux. So these videos are geared for those who are new to KALI/WIRESHARK, or if you need a refresher with the basics. In this video I cover basic Linux file system commands like change directory, create a folder, etc.. then we perform a capture using tshark, open the trace from the command line and then review where the file location configuration is in the Wireshark GUI. Here are the commands I used: pwd – print working directory mkdir – make or create a directory cd – change directory CASE SENSITIVE bonus: rm -r directoryname - remove a directory ls or dir From Wireshark GUI Help-> About for folder location and locate File Dialogs Edit preferences – Remember … change to traces folder ree From terminal emulator tshark -i 1 -w trace,pcapng ping 8.8.8.8 -c 5 ctrl + C to stop tshark capture wireshark trace.pcapng to start Wireshark and trace.pcapng

Monday, July 1, 2024

Internetworks: What is VLAN Access List? How to configure VACL?

 

VLAN ACL Is very useful when we want to filter traffic within the VLAN. When we configure

VACL on the switch, all the packets entering the VLAN are checked against the VLAN

access list. In VACL you cannot define the direction like router ACL. A VACL can either drop

a matching packet, forward it, or redirect it to another interface. Notice that the VACL is

applied globally to one or more VLANs listed and not to a VLAN interface switch virtual

interface (SVI).

Popular post