Tshark Examples – Theory & Implementation

Threat Simulation – Beacons

How to Catch Data Exfiltration With a Single Tshark Command – Video Blog

Suspicious Traffic Found – What Are the Next Steps?

Tshark Examples for Extracting IP Fields

We're always up to cool threat hunting stuff at Active Countermeasures. Sometimes we want to share our cool stuff and we'll mail it to this list. We are not spammy, and no salesy junk!

* indicates required



Choose the Email Categories You Want to Receive:

(un-check any you don't want)


We're always up to cool threat hunting stuff at Active Countermeasures. Sometimes we want to share our cool stuff and we'll mail it to this list. We are not spammy, and no salesy junk!

* indicates required



Choose the Email Categories You Want to Receive:

(un-check any you don't want)