Logging Received Packets
Learn how to log HTTP requests and passively perform port scanning.
We'll cover the following...
Introduction to packet logging
Network traffic monitoring can be used for various purposes. For example, a traffic monitor could monitor access attempts for a particular IT resource, passively generate a graph of a corporate network, or extract credentials from insecure network protocols.
However, all of these applications require the ability to extract and log useful information from network packets. We’ve created filters for packets of interest and ...