...

/

Logging Received Packets

Logging Received Packets

Learn how to log HTTP requests and passively perform port scanning.

Introduction to packet logging

Network traffic monitoring can be used for various purposes. For example, a traffic monitor could monitor access attempts for a particular IT resource, passively generate a graph of a corporate network, or extract credentials from insecure network protocols.

However, all of these applications require the ability to extract and log useful information from network packets. We’ve created filters for packets of interest and ...