Logo

Testlab

  • Network traffic analysis tools

Wireshark

  • Introduction
    • What?
    • Why?
    • How?
  • Nmap scans
    • Questions
  • ARP poisoning & on-path
    • Questions
  • Identifying hosts
    • Questions
  • Tunneling traffic
    • ICMP analysis
    • DNS analysis
    • Questions
  • Clear-text protocol analysis
    • FTP analysis
    • HTTP Analysis
    • User-Agent analysis
    • Questions
  • Encrypted protocol analysis
    • Decrypting HTTPS Traffic
    • Questions
  • Hunt clear-text credentials
    • Questions
  • Firewall rules
    • Questions

Snort

  • Introduction
    • What?
    • Why?
    • How?
  • Writing IDS rules
    • HTTP
    • FTP
    • Images
      • PNG
      • GIF
    • Torrent metafiles
    • Resources
  • MS17-010
  • Log4j
  • Brute force
  • Reverse shell

Zeek

  • Introduction
    • What?
    • Why?
    • How?
  • Network security monitoring
    • Network monitoring
    • Network security monitoring
  • Signatures
    • Questions
      • HTTP
      • FTP
  • Scripts
    • GUI vs scripts
    • Customized script locations
    • Questions
    • Resources
  • Scripts and signatures
    • Questions
  • Frameworks
    • Questions
    • Resources
  • Packages
    • Questions
    • Resources
  • Anomalous DNS
    • Questions
  • Phishing
    • Questions
  • Log4J
    • Questions

Brim

  • Introduction
    • What?
    • Why?
    • How?
  • Use cases
  • Malware C2 detection
    • Questions
  • Crypto mining
    • Questions

Root-me challenges

  • Introduction
    • What?
    • Why?
    • How?
  • FTP authentication
  • TELNET authentication
  • ETHERNET frame
  • Twitter authentication
  • Bluetooth Unknown file
  • CISCO password
    • Resources
  • DNS zone transfer
  • IP Time To Live
  • LDAP null bind
    • Resources
  • POP-APOP
    • Resources
  • SIP - authentication
  • ETHERNET patched transmission
    • First frame
    • Second frame
    • Third frame
    • Fourth frame
    • Resources
  • Global system traffic for mobile communication
    • Resources
  • SSL HTTP exchange
    • Resources
Network traffic analysis (NTA)
  • Ty Myrddin Home
  • Unseen University
  • Improbability Blog
  • About
  • Contact

Network traffic analysis (NTA)

Spot and probe network anomalies using industry tools and techniques.

Forever in progress ...

Testlab

  • Network traffic analysis tools

TryHackMe rooms

Wireshark

  • Introduction
  • Nmap scans
  • ARP poisoning & on-path
  • Identifying hosts
  • Tunneling traffic
  • Clear-text protocol analysis
  • Encrypted protocol analysis
  • Hunt clear-text credentials
  • Firewall rules

Snort

  • Introduction
  • Writing IDS rules
  • MS17-010
  • Log4j
  • Brute force
  • Reverse shell

Zeek

  • Introduction
  • Network security monitoring
  • Signatures
  • Scripts
  • Scripts and signatures
  • Frameworks
  • Packages
  • Anomalous DNS
  • Phishing
  • Log4J

Brim

  • Introduction
  • Use cases
  • Malware C2 detection
  • Crypto mining

Root-me challenges

  • Introduction
  • FTP authentication
  • TELNET authentication
  • ETHERNET frame
  • Twitter authentication
  • Bluetooth Unknown file
  • CISCO password
  • DNS zone transfer
  • IP Time To Live
  • LDAP null bind
  • POP-APOP
  • SIP - authentication
  • ETHERNET patched transmission
  • Global system traffic for mobile communication
  • SSL HTTP exchange

Books

_images/practice-network-security-monitoring.png
_images/packet-analysis-wireshark.png
_images/network-protocols-security-pros.png
_images/nmap-network-exploration.png
_images/cybersecurity-small-networks.png
_images/ai-security-frameworks.png
Next

Unseen University, 2024, with a forest garden fostered by /ut7.