We’re lucky to have hundreds of awesome packet sniffers to choose from, but what happens when none of them do exactly what you want?
When there’s no off-the-shelf tool to handle the task, consider writing your own sniffer!
In this Active Countermeasures webcast, Bill Stearns will teach you how to build your own sniffer using a skeleton that handles a huge amount of the grunt work.
The talk will be most valuable to those interested in packet sniffing, packet analysis, and network security. We’ll provide a template for a python program you can use for your own projects, but you don’t have to be a python programmer to join us and see how this works.
Chat with your fellow attendees in the Threat Hunter Community Discord server here: https://discord.gg/threathunter — in the #π΄live-webcast-chat