<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>packet capture Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/tag/packet-capture/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/tag/packet-capture</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Tue, 15 Mar 2022 19:22:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>packet capture Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/tag/packet-capture</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Webinar takeaway &#8211; The Ins and Outs of RITA</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-the-ins-and-outs-of-rita</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-the-ins-and-outs-of-rita#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 15 Mar 2022 19:21:55 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[beacon]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[packet capture]]></category>
		<category><![CDATA[threat hunting]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=946</guid>

					<description><![CDATA[<p>My key takeaways RITA is made to detect beacons and long connections open source tool Signature based detection of malicious code is outdated Average detect time is over 6 month > 50% of compromised systems are detected by outsiders RITA is behaviour based Needs a bunch of pakets to work on min 1h, default 24h [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-the-ins-and-outs-of-rita">Webinar takeaway &#8211; The Ins and Outs of RITA</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-the-ins-and-outs-of-rita/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway &#8211; BPF &#8211; Picking Packets</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-bpf-picking-packets</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-bpf-picking-packets#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 05 Jan 2022 20:07:43 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[packet capture]]></category>
		<category><![CDATA[threat hunting]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=591</guid>

					<description><![CDATA[<p>My key takeaways one lib to capture all pakets for all OS BPF is to filter packages better SNR for packet filtering BPF filter effect only the programm you call it with no change to the package itself Process: human creats filter single quotes at the end of the line invoking the prg like tcpdump [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-bpf-picking-packets">Webinar takeaway &#8211; BPF &#8211; Picking Packets</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-bpf-picking-packets/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: Hacking Packet Captures: The Foundations of Network Security</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-hacking-packet-captures-the-foundations-of-network-security</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-hacking-packet-captures-the-foundations-of-network-security#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 07 Jul 2021 19:22:53 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[packet capture]]></category>
		<category><![CDATA[zeek]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=524</guid>

					<description><![CDATA[<p>My key takeaways Zeek does not capture whole packets but saves summaries of all conversations it sees to log files saves time and space &#34;You wouldn&#8217;t normally use Zeek for packet capture, instead you use it for analysis.&#34; &#8211; Bill Stearn Sending a lot more data then recieving might indicate malicious traffic use NetworkMiner to [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-hacking-packet-captures-the-foundations-of-network-security">Webinar takeaway: Hacking Packet Captures: The Foundations of Network Security</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-hacking-packet-captures-the-foundations-of-network-security/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
