CloudShark Blog

From the shark's mouth

Monday, Sep 19, 2016

Best Practices for Managing and Securing Network Capture Files

This article is the full text of our white paper on the same topic Packet Capture Files: Valuable but Vulnerable Packet capture files - files that record network traffic—are invaluable resources for network administrators, help desk staff, and IT security experts. Filled with application data and protocols, timestamps, and error codes, these files provide IT engineers with a detailed view of what took place on a network during a specific period of time.

Read the whole entry »

Friday, Sep 16, 2016

HIPAA, shadow IT, and the packet capture problem

Note: We here at CloudShark aren’t HIPAA experts, we just think its neat to talk about. Don’t take this as “official” advice. Recently we’ve been having some “water-cooler” (we don’t have a water cooler, it’s actually a shark tank) discussion around the security of packet captures in general, and naturally, how that applies to regulations like HIPAA, the “Health Insurance Privacy and Accountability Act”. HIPAA and packet captures The relevant parts of HIPAA to packet capture security include sections on workstation use and security, device and media controls (including rules for backup and storage), access controls to electronic resources, and a section that addresses transmission security, which requires encryption of those record during transmission.

Read the whole entry »

Wednesday, Sep 14, 2016

Automating remote capture with pcapdaemon and CloudShark

Automating remote capture with pcapdaemon and CloudShark from QA Cafe on Vimeo. One of the most powerful ways to use CloudShark is to aggregate captures from multiple locations. While many network devices have packet capture natively (and some integrated with CloudShark upload), for other systems, it’s necessary to use custom scripts that utilize tshark (with the CloudShark plug-in for Wireshark installed) or tcpdump in tandem with CURL to use the CloudShark upload API.

Read the whole entry »

Friday, Aug 26, 2016

Solutions: The Big Byte Capture Challenge

Every summer the devs here at CloudShark engage in a “Summer Coding Challenge” to flex their programming muscles and relive the glory (horror?) days of computer science homework. It just so happens that one of those challenges this year made a great packet capture challenge for you CloudShark fans! We got a lot of great answers - we have some of those solutions below, but if you don’t want it spoiled and want to try the capture for yourself, here it is: The Challenge - “The Big Byte” Your task is to create a capture file session that shows a TCP session transfering at least 1,000,000 bytes of data (that’s a mega bite!

Read the whole entry »

Thursday, Jul 21, 2016

Searching your captures with CloudShark DeepSearch (Webinar)

Join our webinar on Tuesday, August 2nd, at 11:00 EDT New in CloudShark 3.0, DeepSearch lets you get more out of your capture archive by finding packets that match standard Wireshark filters. Then use CloudShark’s web-based analysis to drill-down, share, and resolve. It’s that easy. Join the CloudShark team as we show you: Selecting captures to DeepSearch Several DeepSearch use cases Re-using previously used filters And more! This is part of our ongoing CloudShark webinar series.

Read the whole entry »


Popular Tags

Older Entries

About Us

CloudShark is made by QA Cafe, a technology company based in Portsmouth, NH. Our passion for packet captures has grown out of our other product CDRouter.

Get in touch via our Contact us page or by following us on your favorite service: