Packet Analysis

Wireshark

Wireshark  is a powerful packet sniffer and network protocol analyzer used by SOC analysts to capture and inspect network traffic. It allows for detailed inspection of packets, providing insight into data flows, network performance, and potential security threats. Analysts can filter traffic, identify abnormal patterns, and examine the contents of packets to detect malware, unauthorized access, or unusual activity.

Real-world application:

A SOC analyst uses Wireshark to investigate a suspected data breach in an organization. By capturing and analyzing network packets, the analyst identifies unusual outbound traffic to an external server, which turns out to be a malicious exfiltration of sensitive data. Wireshark’s detailed view of the packet contents helps the analyst pinpoint the source of the breach and take corrective action, such as blocking the compromised server.

tcpdump

tcpdump is a network packet analyzer used to capture and analyze network traffic in real-time. It helps users monitor and troubleshoot network issues by displaying detailed information about the data being transmitted over a network.

Key Features:

  • Captures network packets from various protocols (e.g., TCP, UDP, ICMP)
  • Filters traffic using custom capture expressions
  • Supports saving captured data for later analysis

Real-World Application: Commonly used by network administrators and cybersecurity professionals for network troubleshooting, security monitoring, and traffic analysis.

Zeek (formerly Bro)

Zeek is an open-source network monitoring tool that provides deep visibility into network traffic. It is used for security monitoring, network analysis, and threat detection. Zeek focuses on tracking network activity, generating detailed logs, and providing insights into potential security incidents.

Key Features:

  • Real-time network traffic analysis
  • Comprehensive logging and event detection
  • Customizable scripts for tailored analysis

Real-World Application: Zeek is widely used in cybersecurity for detecting anomalies, conducting forensics, and monitoring network traffic for potential threats.

Categories

Explore Our Comprehensive Collection of Essential SOC Tools for Cybersecurity

Scroll to Top