CloudShark Appliance

From the shark's mouth

Tuesday, May 19, 2015

AccessAgility Wifi Scanner Includes CloudShark Support

We’re always excited whenever a new network tool or packet capture service is able to make use of the CloudShark API in order to integrate the seamless analysis of packet captures into their products. Integrators like AccessAgility’s Wifi Scanner are exactly what CloudShark was designed for. Wifi Scanner Manager is a cloud-managed Wifi scanner that, when paired with WFS Agents, lets them become instant WiFi scanners and performance testers. You can find access points, determine their connectivity, do quick spot surveying, and find unauthorized access points.

Read the whole entry »

Thursday, May 14, 2015

All about SSL key logging

In CloudShark 2.5, we added the ability to use SSL key log file data in order to decrypt SSL streams in the packet viewer. But what exactly is an SSL key log file, and how do you get them so that you can do web site and web service debugging? A key log is a log of the values used by your web browser to generate TLS session keys. Your browser does this every time, but it doesn’t do anything else with those values once they are used.

Read the whole entry »

Monday, Apr 27, 2015

Using a bandwidth preview to triage captures

Our latest maintenance release of CloudShark 2.5, adds a cool new feature: the ability to view a small sparkline graph of each of your captures packets-per-second (bandwidth). You can add this to your index view by editing the table options in your capture file index. How might such a thing be useful? Quickly noticing patterns Some issues can be seen in the regularity of certain traffic patterns. For instance, seeing packet rate spikes occur at regular intervals can point to a rogue agent on your network attempting some funny business, or issues with applications trying to accomplish some network heavy task, then repeating it when it is unsuccessful.

Read the whole entry »

Friday, Apr 24, 2015

Captures and Analysis of the QUANTUMINSERT Attack

We now know a lot about the NSA’s various techniques in its QUANTUM program. One of the most prolific (and sneaky) of these attacks is the “QUANTUMINSERT”, which exploits a long-known TCP vulnerability that will cause, effectively, a redirect to a malicious resource. It’s tricky, since it requires careful timing; the spoofed packet needs to arrive before the expected packet. One of our most engaging customers, Fox-IT, is an active team of hackers, programmers, and cybersecurity experts that provides innovative solutions for government, defense, law enforcement, critical infrastructure, banking, and commercial enterprise clients worldwide.

Read the whole entry »

Thursday, Apr 23, 2015

TruePath Technologies complete nTop/CloudShark solution

It’s not often that seamless solutions present themselves as well as they do with nTop’s CloudShark integration with their n2disk product. What could make it even better is the ability to get an all-in-one network monitoring and analysis system with both of these systems through TruePath Technologies. Now an official CloudShark reseller, TruePath offers a suite of monitoring software and monitoring software services to help companies harness the potential of their networks, and specializes in in-house services for new or existing IT monitoring software.

Read the whole entry »


Popular Tags

Older Entries

About Us

CloudShark Appliance is made by QA Cafe, a technology company based in Portsmouth, NH. Our passion for packet captures has grown out of our other product CDRouter.

Get in touch via our Contact us page or by following us on your favorite service: