Couchdrop.io is a secure cloud storage service that lets you use SCP to manipulate your data assets. They’ve integrated with cloud storage giants like Dropbox, Google Drive, and AWS-S3. With their CloudShark integration, you can make use of custom scripts or interaction with remote servers that have packet capture capability to instantly and securely push network traces to CloudShark, analyzing them without ever leaving your browser.
Working with logs, captures, and other remote data Couchdrop is a cloud-based SCP server that can be used for any kind of data, but it has some particular advantages when troubleshooting remote servers, firewalls, and other systems.
StackStorm, by Extreme Networks, is a powerful automation platform that wires together all of your apps, services and workflows. It is richly extensible, letting you integrate with all manner of network equipment, analysis tools, and more. They have both an open source version and a version that is part of Extreme Networks’ “Extreme Workflow Composer”.
The team there has built a plug-in for CloudShark upload that they featured at Networking Field Day 17 (part of their StackStorm-Exchange open source projects).
Watch our in-depth video
If you deploy Aerohive devices in your network, solving problems using network captures will get it done faster. Aerohive’s integration with CloudShark makes it easy to actually work with real network traces. Watch our in-depth seminar above on how to solve a real-world problem using HiveManger NG and CloudShark.
If you’re brand new, you can read the basics of how to set up your Aerohive system with CloudShark.
We’re happen to announce a great partnership with Velocimetrics, who has integrated CloudShark Enterprise into their financial/trade data network visibility solution.
Read the full press release or summary here:
Velocimetrics, the provider of real-time business flow tracking and performance analytics and CloudShark, the world’s first web-based packet capture management and analysis system have today announced a tie-up, which will enable traders, network operatives and financial IT specialists to have greater visibility into network packets of data.
When an wireless access point wants to advertise its available networks, it sends out 802.11 beacon frames. These frames are seen by other 802.11 receiving radios, and if you can capture those frames, you can use CloudShark’s Wireless Networks tool to see all of the wireless networks (named with their SSIDs) nearby.
Alternatively, when Wifi stations come online, they may send out a frame called a “Probe Request”. An access point can respond to these requests with a “Probe Response”.
Today’s Wireless Access Points have multiple radio interfaces (for the 2.4 GHz and 5 GHz ranges) that can both host Wifi clients. What if you want to see capture data from both? Aerohive’s HiveManagerNG lets you capture on both of these interfaces at the same time. This makes two different captures, but with CloudShark’s Merge feature you can put them together and view all of the packets going through your AP at once.
By now you’ve signed up for a CloudShark account and probably pushed your first capture from HiveManager NG into your repository. Where do you go from here? What sort of things should you be looking for?
What exactly have I captured? A packet capture file sourced from your Aerohive device contains a record of all network traffic that passed through the interface you chose when doing your capture. In HiveManager NG, if you have captured on a WLAN interface, this will be 802.
Automating remote capture with pcapdaemon and CloudShark from QA Cafe on Vimeo.
One of the most powerful ways to use CloudShark is to aggregate captures from multiple locations. While many network devices have packet capture natively (and some integrated with CloudShark upload), for other systems, it’s necessary to use custom scripts that utilize tshark (with the CloudShark plug-in for Wireshark installed) or tcpdump in tandem with CURL to use the CloudShark upload API.
Watch the video. Sometimes when analyzing problems in Wifi networks you need to go straight to the packets. What tools are there to do Wifi capture? What should you look for in your packets?
Watch one of our premier integrators, Airtool’s Adrian Granados, as he shows you:
Installing and configuring the Airtool wireless tool for OSX Capturing and uploading to CloudShark Wifi packet analysis tools in CloudShark And more!
Watch the video. If you’re a Meraki user or MSP, you’ve probably seen the ability to point to CloudShark in your Dashboard. How does it work? What can you do with it?
Join us as we show you:
Configuring your Meraki dashboard for CloudShark uploads Capturing packets in your dashboard Analyzing in CloudShark
Watch the video. We absolutely love the community that CloudShark and the CloudShark API has created. Adding to our list of integrators is Adrian Granados creator of the free Wifi tool for Mac called Airtool. Airtool is a free Mac OS X menu bar application that lets you check and configure wireless settings. It also performs captures across one or more Wi-Fi channels. In his version of Airtool 1.2, Adrian has been kind enough to add CloudShark as a target destination for captured packets.
Well, it’s official; the IETF has officially deprecated SSLv3.0. This means that it’s now a protocol violation to fall back to it. This is good news, since the number and types of attacks have been on the rise for awhile now. We’d like to take the opportunity to explore how to debug web applications that use HTTPS over SSL/TLS in CloudShark.
It’s undeniable that debugging HTTP traffic is one of the most common use-cases for a packet decoder.
We’re always excited whenever a new network tool or packet capture service is able to make use of the CloudShark API in order to integrate the seamless analysis of packet captures into their products. Integrators like AccessAgility’s Wifi Scanner are exactly what CloudShark was designed for.
Wifi Scanner Manager is a cloud-managed Wifi scanner that, when paired with WFS Agents, lets them become instant WiFi scanners and performance testers. You can find access points, determine their connectivity, do quick spot surveying, and find unauthorized access points.
It’s not often that seamless solutions present themselves as well as they do with nTop’s CloudShark integration with their n2disk product. What could make it even better is the ability to get an all-in-one network monitoring and analysis system with both of these systems through TruePath Technologies.
An official CloudShark reseller, TruePath offers a suite of monitoring software and monitoring software services to help companies harness the potential of their networks, and specializes in in-house services for new or existing IT monitoring software.
Those in the CPE world are probably very familiar with OpenWrt, an open source linux implementation for embedded devices, including home gateways or wireless routers. OpenWrt is popular and extensible, with over 3000 available packages.
Recently, an OpernWrt package was developed that adds QA Cafe CloudShark capture and upload capability. The new package supports packet capture and viewing directly in the browser. A home router can be instantly transformed into a network troubleshooting tool or probe.
We’re excited to have another great android app that can perform packet capture and upload to CloudShark.
Lostnet Soft’s App and Geo Firewall for Android devices lets you take full control of your mobile network connection, limiting what apps are allowed to use and observing the biggest offenders of data usage and sharing.
The firewall lets you set rules on both a per app and per location basis, so you can block access to addresses in particular countries if you suspect that there may be security violations, malware, or sharing of data that you did not approve.
One advantage of Android over iOS for those of us in the packet industry is the ability to access the network interfaces. The popular Kismet Android PCAP app lets you capture on a USB wireless adapter using an Android device. But did you know that you can also capture directly on Android’s wireless interface? Paired with Kismet’s CloudShark Uploader for Android and you can actually capture, upload, view, and analyze all from your mobile android device.
We love it when good ideas come together.
Recently we were contacted by the smart people at Polidea, a company that delivers dynamic mobile app design, development, and testing to its clients. To assist in the latter, Polidea cooked up an open source Cellular Data Network Simulator that you can grab on GitHub.
We got a chance to talk to Kamil Trzciński from Polidea about the project and their CloudShark integration.
It’s no secret that CloudShark uses tshark to generate the data we use in the CloudShark database, resulting in what you see when you view a capture in the CloudShark viewer. CloudShark sorts and caches this information to make it faster and easier for you to get to the information you need, when you need it.
The added advantage of using tshark is that all of the most recent dissectors published in the latest versions of Wireshark can be used in CloudShark immediately without any additional work.
This webinar has concluded! If you missed it, you can view it on The CloudShark Channel here:
Watch the video. Title: Using Cisco Meraki's Embedded CloudShark Features Date: Wednesday, August 14, 2013 Time: 11:00 AM - 12:00 PM EDT Space is limited. Reserve your Webinar seat now at: https://www4.gotomeeting.com/register/371875439
Do you use Meraki web managed networking devices? Do you need to troubleshoot networks that use them? Did you know they have an embedded capture mechanism?
The developers over at Kismet Wireless just released an packet capture app for Android devices that lets you use an external USB wireless adapter to capture layer 2 wireless LAN traffic and store in pcap format. How cool is that? The best part is, they’ve also built a handy CloudShark Uploader for Android as well!
When you have performed a capture using Android PCAP, you can then use the Android Cloudshark Uploader to directly upload your captures from your Android device to CloudShark.
Read this great article by ISSA Journal on Cloudshark/NST integration!
We are pleased to announce that Network Security Toolkit has integrated CloudShark upload capability into their 12.16.0-4104 release. NST is a very comprehensive suite of open source network security and analysis tools with a complete web interface, allowing you to perform a number of functions remotely by accessing the system on which NST is installed.
The addition of the CloudShark Upload Manager lets NST users perform multi-tap packet capture and instantly upload those captures to a CloudShark Appliance - centralizing your captures and letting you view and analyze them anywhere on any device.
HOMER SIP Capture Server, a robust, carrier grade, 100% open source scalable SIP Capture system and Monitoring Application, has become the first open source application to introduce native support for CloudShark! End users of the application now have the option to upload their captures to cloudshark.org, or to their own CloudShark appliance, where they can be viewed directly in a browser or shared with others via URL.
One of the great examples of how easily CloudShark can integrate with existing tools.
We’re happy to announce that the CloudShark plug-in for WireShark has been released! Download now and start securing, viewing, and sharing your WireShark captures as they are produced. Or, view our demo video to get a look at the plug-in in action. Happy packet surfing!