MiscPCAP
scapy.pdf
TCPIP_PRG.pdf
IPv6_PRG.pdf
https://github.com/Sh3lldor/PVT
PVT will visualize a given PCAP with neo4j and neovis in an easy and intuitive way.
https://github.com/cisagov/Malcolm
Malcolm is a powerful network traffic analysis tool suite designed with the following goals in mind:
- Easy to use – Malcolm accepts network traffic data
in the form of full packet capture (PCAP) files and Zeek (formerly Bro)
logs. These artifacts can be uploaded via a simple browser-based
interface or captured live and forwarded to Malcolm using lightweight
forwarders. In either case, the data is automatically normalized,
enriched, and correlated for analysis.
- Powerful traffic analysis – Visibility into network communications is provided through two intuitive interfaces: OpenSearch Dashboard, a flexible data visualization plugin with dozens of prebuilt dashboards providing an at-a-glance overview of network protocols; and
Arkime (formerly Moloch), a powerful tool for finding and identifying
the network sessions comprising suspected security incidents.
- Streamlined deployment – Malcolm operates as a
cluster of Docker containers – isolated sandboxes that each serve a
dedicated function of the system. This Docker-based deployment model,
combined with a few simple scripts for setup and run-time management,
makes Malcolm suitable to be deployed quickly across a variety of
platforms and use cases; whether it be for long-term deployment on a
Linux server in a security operations center (SOC) or for incident
response on a Macbook for an individual engagement.
- Secure communications – All communications with
Malcolm, both from the user interface and from remote log forwarders,
are secured with industry standard encryption protocols.
- Permissive license – Malcolm is comprised of
several widely used open-source tools, making it an attractive
alternative to security solutions requiring paid licenses.
- Expanding control systems visibility – While
Malcolm is great for general-purpose network traffic analysis, its
creators see a particular need in the community for tools providing
insight into protocols used in industrial control systems (ICS)
environments. Ongoing Malcolm development will aim to provide additional parsers for common ICS protocols.
https://github.com/nsacyber/GRASSMARLIN
GRASSMARLIN provides IP network situational awareness of industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks to support network security. Passively map, and visually display, an ICS/SCADA network topology while safely conducting device discovery, accounting, and reporting on these critical cyber-physical systems.
https://github.com/cutaway-security/ICSPcapViz
A packet capture visualizer for industrial control
networks. This project takes a network packet capture file (PCAP),
processes the packets using pyshark
, and sends information
about the traffic to a Neo4j database. The Neo4j browsers and tools can
be used to visualize and interact with the network information collected
from the PCAP. Visualization of network communications provides with the development and review of network and data flow diagrams.
Chaosreader
This is a type of "any-snarf" program, as it will
fetch telnet sessions, FTP files, HTTP transfers (HTML, GIF, JPEG, ...),
SMTP emails, ... from the captured data inside network traffic logs.
A html index file is created that links to all the session details, including
realtime replay programs for telnet, rlogin, IRC, X11 and VNC sessions; and
reports such as image reports and HTTP GET/POST content reports.