mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

8.4K
active users

Seth Grover<p>Hey, y'all, if you have anything to do with the Zeek network security monitor (as a user, script/plugin developer, researcher, whatever), would you please take 10 minutes to fill out the <a href="https://zeek.org/survey" rel="nofollow noopener" target="_blank">Zeek Project Survey 2025</a>. This is your chance to help the Zeek team know how you feel about the project and help shape its direction moving forward.</p><p><a href="https://infosec.exchange/tags/Zeek" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zeek</span></a> <a href="https://infosec.exchange/tags/PCAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PCAP</span></a> <a href="https://infosec.exchange/tags/NetworkTrafficAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkTrafficAnalysis</span></a> <a href="https://infosec.exchange/tags/networksecuritymonitoring" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networksecuritymonitoring</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a></p>
Adam ♿<p>[Still haven't sorted this as of 2025-07-12]</p><p><a href="https://aus.social/tags/AskFedi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AskFedi</span></a> <a href="https://aus.social/tags/BoostsAreAppreciated" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BoostsAreAppreciated</span></a> <a href="https://aus.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://aus.social/tags/BSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSD</span></a> <a href="https://aus.social/tags/Networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Networking</span></a> <a href="https://aus.social/tags/PCAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PCAP</span></a></p><p>I am looking for some kind of VM or system I can run to create a network that I can put an untrusted device on to and allow/deny all its connections one by one - think auditioning a new TV or IOT device rather than out-and-out hostile malware. Assume I will also dump packets for investigation.</p><p>Security Onion looks like overkill but I'd like to avoid writing my own firewall rules if possible.</p>
Brad<p>2025-06-26 (Thursday): <a href="https://infosec.exchange/tags/LummaStealer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LummaStealer</span></a> infection leads to follow-up loader that retrieves a pen test tool hosted on Github and configures it as <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a>. </p><p>A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> of the infection traffic, the associated malware, and IOCs are available at: <a href="https://www.malware-traffic-analysis.net/2025/06/26/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">025/06/26/index.html</span></a></p><p><a href="https://infosec.exchange/tags/Lumma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lumma</span></a></p>
Voting Access For All<p>On August 1, Linkage Community will begin operating independently from the University of Michigan’s Prison Creative Arts Project, where the group got its start as a space for formerly incarcerated creatives to thrive during the transition from prison back to their Michigan communities. This is a major milestone, marking growth of the group beyond its origins as a part of the University’s […]</p><p><a href="https://votingaccessforall.org/2025/06/linkage-community-launches-as-independent-organization/" class="" rel="nofollow noopener" target="_blank">https://votingaccessforall.org/2025/06/linkage-community-launches-as-independent-organization/</a></p>
Seth GroverRelease notes for v25.06.0 of Malcolm, a powerful, easily deployable network traffic analysis tool suite for network security monitoring
Brad<p>2025-06-21 (Saturday): <a href="https://infosec.exchange/tags/KoiLoader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KoiLoader</span></a> / <a href="https://infosec.exchange/tags/KoiStealer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KoiStealer</span></a> infection. </p><p>A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> of the infection traffic, associated malware/files, and some of the indicators are available at <a href="https://www.malware-traffic-analysis.net/2025/06/21/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">025/06/21/index.html</span></a></p>
Brad<p>025-06-20 (Friday): From a post I wrote for my employer on other social media about distribution of <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> disguised as cracked software. </p><p>The malware is contained in password-protected 7-Zip archives to avoid detection. </p><p>A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> from running the malware, and the associated malware files are available at <a href="https://www.malware-traffic-analysis.net/2025/06/20/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">025/06/20/index.html</span></a></p><p>I don't know what this malware is, so if anyone knows, feel free to reply. I'm just here for the memes.</p>
Brad<p>2025-06-18 (Wednesday): <a href="https://infosec.exchange/tags/SmartApeSG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmartApeSG</span></a> --&gt; <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> lure --&gt; <a href="https://infosec.exchange/tags/NetSupportRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetSupportRAT</span></a> --&gt; <a href="https://infosec.exchange/tags/StealCv2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StealCv2</span></a></p><p>A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> of the traffic, the malware/artifacts, and some IOCs are available at <a href="https://www.malware-traffic-analysis.net/2025/06/18/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">025/06/18/index.html</span></a>.</p><p>Today's the 12th anniversary of my first blog post on malware-traffic-analysis.net, so I made this post a bit more old school.</p>
Brad<p>2025-06-10 (Tuesday): Ten days of scans and probes and web traffic to a web server I run (not my blog web server, but another one).</p><p>After helping a coworker review an Apache Tomcat vulnerability, I opened TCP port 8080 to accept web traffic requests.</p><p>A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> of the traffic is available at: <a href="https://www.malware-traffic-analysis.net/2025/06/10/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">025/06/10/index.html</span></a></p>
gary<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@Alonso_ReYDeS" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Alonso_ReYDeS</span></a></span> i say sniff 24/7 or else what the heck are you doing? <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> <a href="https://infosec.exchange/tags/arkime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>arkime</span></a> <a href="https://infosec.exchange/tags/suri" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>suri</span></a></p>
𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲<p>CapLoader 2.0 released today!<br>🔎 Identifies over 250 protocols in <a href="https://infosec.exchange/tags/PCAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PCAP</span></a><br>🎨 Define protocols from example traffic<br>🇶 Extracts JA3, JA4 and SNI from QUIC<br>💻 10x faster user interface<br><a href="https://netresec.com/?b=256dbbc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">netresec.com/?b=256dbbc</span><span class="invisible"></span></a></p>
Axel ⌨🐧🐪🚴😷 | R.I.P Natenom<p><a href="https://www.noslang.com/search/poidnh" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">noslang.com/search/poidnh</span><span class="invisible"></span></a> claims that <a href="https://chaos.social/tags/POIDNH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>POIDNH</span></a> stands for <a href="https://chaos.social/tags/PicsOrItDidNotHappen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PicsOrItDidNotHappen</span></a>. But I knew it as <a href="https://chaos.social/tags/PCAPsOrItDidNotHappen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PCAPsOrItDidNotHappen</span></a> 🤓</p><p><a href="https://chaos.social/tags/WireShark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireShark</span></a> <a href="https://chaos.social/tags/Sticker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sticker</span></a> <a href="https://chaos.social/tags/PCAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PCAP</span></a> <a href="https://chaos.social/tags/PCAPsOrItDidntHappen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PCAPsOrItDidntHappen</span></a></p>
Baker Street Forensics<p><strong>MalChela 2.2 “REMnux”&nbsp;Release</strong></p><p class="">MalChela’s 2.2 update is packed with practical and platform-friendly improvements. It includes native support for <strong>REMnux</strong>, better tool settings, and deeper integrations with analysis tools like <strong>YARA-X</strong>, <strong>Tshark</strong>, <strong>Volatility3</strong>, and the newly improved <strong>fileanalyzer</strong> module.</p><p><strong>🦀 REMnux Edition: Built-In Support, Zero Tweaks</strong></p><p>When the GUI loads a REMnux-specific tools.yaml profile, it enters REMnux mode.</p> Screenshot of yaml configuration applying REMnux mode <p>Native binaries and Python scripts like capa, oledump.py, olevba, and FLOSS are loaded into the MalChela tools menu, allowing you to mix and match operations with the embedded MalChela utilities and the full REMnux tool stack. No manual configuration needed—just launch and go. MalChela currently supports the following REMnux programs right out of the box:</p>Tool NameDescriptionbinwalkFirmware analysis and extraction toolcapaIdentifies capabilities in executable filesradare2Advanced reverse engineering frameworkVolatility 3Memory forensics framework for RAM analysisexiftoolExtracts metadata from images, documents, and moreTSharkTerminal-based network packet analyzer (Wireshark CLI)mraptorDetects malicious macros in Office documentsoledumpParses OLE files and embedded streamsoleidIdentifies features in OLE files that may indicate threatsolevbaExtracts and analyzes VBA macros from Office filesrtfobjExtracts embedded objects from RTF documentszipdumpInspects contents of ZIP files, including suspicious payloadspdf-parserAnalyzes structure and contents of suspicious PDFsFLOSSReveals obfuscated and decoded strings in binariesclamscanOn-demand virus scanner using ClamAV enginestringsExtracts printable strings from binary filesYARA-XNext-generation high-performance YARA rule scanner<p>If you only need a subset of tools you can easily save and restore that a custom profile.</p> <p><strong>TShark Panel with Built-In Reference</strong></p>Tshark and the integrated field reference<p>A new TShark integration exposes features including:</p><ul><li>A filter builder panel</li><li>Commonly used fields reference</li><li>Tooltip hints for each example (e.g., `ip.addr == 192.168.1.1` shows “Any traffic to or from 192.168.1.1”)</li><li>One-click copy support</li></ul><p>This helps analysts build and understand filters quickly—even if TShark isn’t something they use every day. Using the syntax builder in MalChela you can use the exact commands directly in Tshark or Wireshark.</p> <p><strong>YARA-X Support (Install Guide Included)</strong></p>YARA-X module in MalChela<p>Support for YARA-X (via the `yr` binary) is now built in. YARA-X is not bundled with REMnux by default, but install instructions are included in the <a href="https://dwmetz.github.io/MalChela/" rel="nofollow noopener" target="_blank">User Guide</a> for both macOS and Linux users.</p><p>Once installed, MalChela allows for rule-based scanning from the GUI,and with YARA-X, it’s faster than ever.</p> <p><strong>fileanalyzer: Fuzzy Hashing, PE Metadata, and More</strong></p>Updated FileAnalyzer Module<p>MalChela’s <strong>fileanalyzer</strong> tool has also been updated to include:</p><ul><li>Fuzzy hashing support via `ssdeep`</li><li>BLAKE3 hashing for fast, secure fingerprints</li><li>Expanded PE analysis, including:</li><li><strong>Import and Export Table parsing</strong>&nbsp;(list of imported and exported functions)</li><li><strong>Compilation Timestamp</strong>&nbsp;(for detection of suspicious or forged build times)</li><li><strong>Section Characteristics</strong>&nbsp;(flags like&nbsp;IMAGE_SCN_MEM_EXECUTE,&nbsp;IMAGE_SCN_CNT_CODE, etc., for detecting anomalous sections)</li></ul><p>These improvements provide deeper insight into executable structure, helping analysts detect anomalies such as packers, suspicious timestamps, or unexpected imports/exports. Useful for everything from sample triage to correlation, <strong>fileanalyzer</strong> now digs deeper—without slowing down.</p> <p><strong>Memory Forensics Gets a Boost: Volatility 3 Now Supported</strong></p><p class="">With the 2.2 release, MalChela introduces support for Volatility 3, the modern Python-based memory forensics framework. Whether you’re running MalChela in REMnux or on a customized macOS or Linux setup, you can now access the full power of Volatility directly from the MalChela GUI.</p>Volatility 3 in MalChela<p class="">There’s an intuitive plugin selector that dynamically adjusts available arguments based on your chosen plugin,. You can search, sort, and browse available plugins, and even toggle output options like –dump-dir with ease.</p><p>Like Tshark, there is an added plugin reference panel with searchable descriptions and argument overviews — a real time-saver when navigating Volatility’s deep and often complex toolset.</p> Volatility Plugin Reference <p><strong>Smarter Tool Configuration via YAML</strong></p><p>The tool configuration system continues to evolve:</p><ul><li>Tools now declare their input type (file, folder, or hash)</li><li>The GUI dynamically adjusts the interface to match</li><li>Alternate profiles (like REMnux setups) can be managed simply by swapping `tools.yaml` files via the GUI</li><li>Easily backup or restore your custom setups</li><li>Restore the default toolset to get back to basics</li></ul><p>This structure helps keep things clean—whether you’re testing, teaching, or deploying in a lab environment.</p> <p><strong>Embedded Documentation Access</strong></p><p>The GUI now includes a link to the full MalChela User Guide in <a href="https://github.com/dwmetz/MalChela/blob/main/docs/MalChela_User_Guide.pdf" rel="nofollow noopener" target="_blank">PDF</a>. You can also access the documentation <a href="https://dwmetz.github.io/MalChela/" rel="nofollow noopener" target="_blank">online</a>.</p><p>From tool usage and CLI flags to configuration tips and install steps, it’s all just a click away—especially useful in offline environments or when onboarding new analysts. I’ll be honest, this is likely the most comprehensive user guide I’ve ever written.</p> <p class="">Whether you’re reviewing binaries, building hash sets, or exploring network captures—MalChela 2.2 is designed bring together the tools you need, and make it easier to interoperate between them.</p><p class="">The new REMnux mode makes it even easier to get up and running with dozens of third party integrations. </p><p>Have an idea for a feature or application you’d like to see supported — reach out to me.</p> <p>GitHub: <a href="https://github.com/dwmetz/MalChela/releases/tag/v2.2.0" rel="nofollow noopener" target="_blank">REMnux Release</a></p><p>MalChela User Guide: Online, <a href="https://github.com/dwmetz/MalChela/blob/main/docs/MalChela_User_Guide.pdf" rel="nofollow noopener" target="_blank">PDF</a>, <a href="https://dwmetz.github.io/MalChela/" rel="nofollow noopener" target="_blank">Web</a></p><p>Shop: <a href="https://www.teepublic.com/t-shirt/75306380-steampunk-malchela?store_id=1306149" rel="nofollow noopener" target="_blank">T-shirts, hats, stickers, and more</a></p><p><a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/dfir/" target="_blank">#DFIR</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/github/" target="_blank">#Github</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/malchela/" target="_blank">#MalChela</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/malware/" target="_blank">#Malware</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/malware-analysis/" target="_blank">#MalwareAnalysis</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/memory/" target="_blank">#Memory</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/network/" target="_blank">#Network</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/nsrl/" target="_blank">#NSRL</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/pcap/" target="_blank">#PCAP</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/python/" target="_blank">#Python</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/remnux/" target="_blank">#REMnux</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/rust/" target="_blank">#Rust</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/tshark/" target="_blank">#Tshark</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/virustotal/" target="_blank">#VirusTotal</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/volatility/" target="_blank">#Volatility</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/yara/" target="_blank">#yara</a></p>
Tedi Heriyanto<p>BPF Ninja: Making Sense of Tcpdump, Wireshark, and the PCAP World:<br><a href="https://medium.com/@cyberengage.org/bpf-ninja-making-sense-of-tcpdump-wireshark-and-the-pcap-world-6905797b94d4" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@cyberengage.org/bp</span><span class="invisible">f-ninja-making-sense-of-tcpdump-wireshark-and-the-pcap-world-6905797b94d4</span></a></p><p><a href="https://infosec.exchange/tags/networkforensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networkforensics</span></a> <a href="https://infosec.exchange/tags/tcpdump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcpdump</span></a> <a href="https://infosec.exchange/tags/wireshark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireshark</span></a> <a href="https://infosec.exchange/tags/tshark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tshark</span></a> <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a></p>
Peter N. M. Hansteen<p>erspan(4) committed to -current <a href="https://www.undeadly.org/cgi?action=article;sid=20250515044548" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20250515044548</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/erspan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>erspan</span></a> <a href="https://mastodon.social/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/packetcapture" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>packetcapture</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/monitoring" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>monitoring</span></a> <a href="https://mastodon.social/tags/development" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>development</span></a> <a href="https://mastodon.social/tags/newfeature" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newfeature</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://mastodon.social/tags/freesoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freesoftware</span></a> <a href="https://mastodon.social/tags/libresoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>libresoftware</span></a></p>
Brad<p>2025-05-06 (Tuesday): <a href="https://infosec.exchange/tags/RaspberryRobin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RaspberryRobin</span></a> activity - file hashes, malware samples, <a href="https://infosec.exchange/tags/WebDAV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebDAV</span></a> server info, and a <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> of the infection traffic available at <a href="https://www.malware-traffic-analysis.net/2025/05/06/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">025/05/06/index.html</span></a></p>
Peter N. M. Hansteen<p>erspan(4): ERSPAN Type II collection <a href="https://www.undeadly.org/cgi?action=article;sid=20250512100219" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20250512100219</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/erspan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>erspan</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/span" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>span</span></a> <a href="https://mastodon.social/tags/tunneling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tunneling</span></a> <a href="https://mastodon.social/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> <a href="https://mastodon.social/tags/packetcapture" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>packetcapture</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/monitoring" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>monitoring</span></a></p>
∂𑁨í 🕊 <p><span>PCAPdroid.<br></span><a href="https://mk.phreedom.club/tags/PCAPdroid" rel="nofollow noopener" target="_blank">#PCAPdroid</a> is a privacy-friendly open source app which lets you track, <a href="https://mk.phreedom.club/tags/analyze" rel="nofollow noopener" target="_blank">#analyze</a> and block the connections made by the other apps in your device. It also allows you to export a <a href="https://mk.phreedom.club/tags/PCAP" rel="nofollow noopener" target="_blank">#PCAP</a> <a href="https://mk.phreedom.club/tags/dump" rel="nofollow noopener" target="_blank">#dump</a> of the <a href="https://mk.phreedom.club/tags/traffic" rel="nofollow noopener" target="_blank">#traffic</a><span>, inspect HTTP, decrypt TLS traffic and much more!<br><br>PCAPdroid simulates a VPN in order to capture the network traffic without root. It does not use a remote VPN server, instead data is processed locally on the device.<br></span><a href="https://github.com/emanuele-f/PCAPdroid" rel="nofollow noopener" target="_blank">https://github.com/emanuele-f/PCAPdroid</a><span><br></span><a href="https://f-droid.org/packages/com.emanuelef.remote_capture" rel="nofollow noopener" target="_blank">https://f-droid.org/packages/com.emanuelef.remote_capture</a><span><br></span><a href="https://mk.phreedom.club/tags/android" rel="nofollow noopener" target="_blank">#android</a></p>
Peter N. M. Hansteen<p>bpflogd(8) imported into -current <a href="https://www.undeadly.org/cgi?action=article;sid=20250507113848" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20250507113848</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/bpflogd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bpflogd</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/bpf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bpf</span></a> <a href="https://mastodon.social/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> <a href="https://mastodon.social/tags/packetcapture" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>packetcapture</span></a> <a href="https://mastodon.social/tags/packetlogging" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>packetlogging</span></a> <a href="https://mastodon.social/tags/devops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devops</span></a> <a href="https://mastodon.social/tags/development" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>development</span></a> <a href="https://mastodon.social/tags/current" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>current</span></a> <a href="https://mastodon.social/tags/freesoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freesoftware</span></a> <a href="https://mastodon.social/tags/libresoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>libresoftware</span></a></p>
404Not Found