Category: Training

Thursday, Oct 18, 2018

Using Column Presets in Wireless Analysis

Troubleshooting wireless problems often requires a deep dive down to the packet level. But with so much information in there, how do you know where to look first? CloudShark’s profile presets help set up your view to give you the summary columns you need. It’s a quick and easy way to get the most information about your network traffic. Here’s how to set it up for wireless captures. It all starts with the right profile Building on our own analysis experience, CloudShark has created a default profile for looking at 802.

Read the whole entry »

Tuesday, Oct 9, 2018

How to Identify and Analyze BitTorrent Alerts in Your Network

Tracking down BitTorrent activity with packet captures We love the exercises at, and occasionally we’ll pick some that we try to solve using CloudShark and its tools. This time however, we’re going through one armed with tools that we learned from Brad’s class (the author of malware-traffic-analysis) at Sharkfest US 2018, where he gave an in-depth class on using packet captures for malware analysis, as well as a presentation on Analyzing Windows malware traffic.

Read the whole entry »

Tuesday, Aug 7, 2018

Sharing Packet Capture Collections on CloudShark Online

Users of CloudShark Online can take captures they’ve uploaded and put them together in “collections”. Collections are great for matching up multiple captures that all have to do with the same topic or problem, and is ideal for educators and bloggers looking to use CloudShark captures in their classes and content. Better context makes for better analysis Like everything we build into CloudShark, we’re always surprised by new ways that people are using it.

Read the whole entry »

Monday, Aug 6, 2018

Getting started with packet analysis

There’s three questions we get asked the most here at CloudShark: How do I capture packets and get them into CloudShark? Where can I find example packet captures? Where do I start with packet capture analysis? That last question is very important to us, because one of the things we always want to promote is demystifying the use of packet captures to troubleshoot network and security problems. They are really are the best way, and with the right tools and knowledge they can be your first go-to.

Read the whole entry »

Monday, Jul 23, 2018

What is new with TLS 1.3 - some capture examples

In August of 2018, the Internet Engineering Task Force (IETF) moved Transport Layer Security (TLS) Version 1.3 to RFC 8446. In the world of networking standards, this means it has been properly vetted by the community and is officially ready for showtime on clients and servers. About these captures We're able to look at TLS 1.3 handshakes thanks to support for the protocol in tshark 2.6. CloudShark 3.5 and later versions have support for TLS 1.

Read the whole entry »

Thursday, Jun 21, 2018

Leaking sensitive data while using VPNs

People use Virtual Private Networks (VPNs) for a number of reasons, mostly for enterprise work where it’s necessary to be connected to a company’s network resources when working remotely. Others use them to ensure their network activity is private, using a secure connection to a VPN service. In the latter case, however, a misconfigured VPN setup can cause certain information to remain unsecured, allowing an observer to learn a user’s public and private IP addresses and witness its DNS requests.

Read the whole entry »

Tuesday, Jun 5, 2018

Using filters for navigation and sharing

CloudShark’s display filters are 100% compatible with the Wireshark filters used in packet analysis. With CloudShark, they present a new opportunity for use when sharing your captures with colleagues in order to both present the view you are looking at, or to help navigate to a section of the capture you want them to see. Here’s some tricks we use when getting around town in CloudShark. Filter based on capture content If you know there’s something in the capture you’re looking for immediately, and you want others to see what you’re thinking, you can use the filter ‘frame contains’ to search for a literal string that exists in the capture.

Read the whole entry »

Tuesday, May 29, 2018

What are some easy to use packet capture tools?

A common question we get other than where to find example packet captures is which packet capture tools exist that are either free, work in a command line, work directly with CloudShark, or all of the above. Here’s a list of our go-to capture tools (other than Wireshark of course) and the different scenarios in which they can be used. tshark About ring buffers CloudShark is made to work with capture files directly.

Read the whole entry »

Monday, May 7, 2018

The effects of traffic bursts on network hardware

We’ve written extensively about the phenomenon of network microbursts and how to use the iPerf network performance tool to create them in order to test their effects on your network. Our interest in them grew out of our work with Velocimetrics, since microbursts can have pretty significant effects in financial/trade markets. Our journey down the rabbit-hole got us interested in seeing the effects of microbursts on switches and interfaces in a test network.

Read the whole entry »

Monday, Apr 30, 2018

How do you test microburst effects using iPerf?

Bursty traffic, particularly microbursts, are an often overlooked phenomenon that can cause serious issues with network performance. We’ve explained before what microbursts are and what they look like, but how can you use existing tools to test your network’s reliability in the presence of microbursts? How can I test network throughput? iPerf is one of the most commonly used tools to test network throughput. From their site: iPerf3 is a tool for active measurements of the maximum achievable bandwidth on IP networks.

Read the whole entry »

Saturday, Apr 14, 2018

What is a network microburst and how can you detect them?

When packets are transmitted from one interface to another, they aren’t necessarily delivered consistently. When a multitasking OS gives CPU time to the network process, it will send as much data as it can in the shortest time. In addition, for each “hop” that data traverses, buffering and other resource bottlenecks inherently make most traffic “bursty”. However, not all bursts are easily detected. A tool with fine enough granularity

Read the whole entry »

Monday, Apr 2, 2018

Finding slow http responses

One of the more practical, and yet fundamental uses of packet capture analysis in todays networks is examining HTTP flows to isolate problems with the protocol or underlying network interactions. If you’re writing a web application or trying to debug why a particular service is slow, filtering for and graphing http response times can give you an instant picture of overall performance and outliers. About HTTP response times The http response time is the delta time between when an http request is transmitted, and when the http response is transmitted.

Read the whole entry »

Monday, Mar 5, 2018

Exploring the memcached DDoS attack

During the last week of February in 2018, several big internet sites started seeing a huge increase in a particular style of DDoS attack, taking advantage of the memcached protocol. Being the packet geeks we are, we wanted to explore the attack on one of our own internal servers and get a capture of what’s happening at the packet level so you can see it in action. What is memcached?

Read the whole entry »

Friday, Feb 2, 2018

Malware Analysis Exercise - When Your Users Run Email Attachments

CloudShark developer and packet guru Tom Peterson gives us another example from to learn how to best use CloudShark and our Threat Assessment add-on to get to the root of malicious activity. Let’s join him now for his latest exercise. The exercise: Two Malicious E-mails, Two PCAPs to Analyze In this exercise, we need to find out what happened when some users downloaded some suspicious attachments and executed the attachments contained therein.

Read the whole entry »

Tuesday, Jan 30, 2018

Using Follow Stream for Packet Capture Analysis

When getting to the heart of an application or security problem, finding the right TCP stream and following it using the “Follow TCP Stream” view in CloudShark is usually the place you want to get to in order to see an issue in action, for a great many use cases. But how do you find the right stream, and what should you look for once you’re viewing it? What is a stream?

Read the whole entry »

Thursday, Dec 21, 2017

Six Malware Traffic Analysis Exercises in One

CloudShark developer and packet guru Tom Peterson gives us another example from to learn how to best use CloudShark and our Threat Assessment add-on to get to the root of malicious activity. Let’s join him now for his latest exercise. The exercise: 6 different pcaps with different malicious activity The 2017-11-21 malware traffic analysis exercise is a bit different than the past two I’ve dug into. This exercise is simply 6 PCAPs and our task is to just figure out what’s happening in each one.

Read the whole entry »

Wednesday, Dec 6, 2017

Windows 10 Malware Analysis Exercise in CloudShark

CloudShark developer and packet guru Tom Peterson has been deep in the trenches doing malware analysis exercises from to learn how to best use CloudShark and our Threat Assessment add-on to get to the root of malicious activity. Let’s join him now for his latest exercise. What’s up with this Windows 10 PC? Hi all! Tom here from CloudShark Support. One of the latest exercises from involves seeing some malicious traffic coming from a Windows 10 PC, as set up in the 2017-10-21 malware traffic analysis exercise.

Read the whole entry »

Wednesday, Oct 11, 2017

Getting and using KEYLOG files from cURL

Trying to debug a web application that is dependent on running over a secure connection is difficult. It used to be that it required you to have the private key (in RSA format) in order to do so, and for those situations, CloudShark Enterprise’s RSA Key Management system is ideal. The alternative is to grab a “keylog” file from your browser and use that within CloudShark to decrypt the stream.

Read the whole entry »

Thursday, Oct 5, 2017

Malware Analysis Exercise in CloudShark - 2017-09-19

Hi all! Tom here. You may remember me as the face of CloudShark Support, and your host in our last malware analysis packet capture challenge. I’ve been working through more of the traffic analysis exercises posted at, that we featured in our challenge. These exercises have been a great way to learn how to jump to packet captures first when looking at a potential malware attack. I found them really fun to go through and really digging deep into specific examples of malware and how it infects hosts and networks.

Read the whole entry »

Tuesday, Oct 3, 2017

Add Functionality with the CloudShark Chrome Extension

Deep in the explosive and risky CloudShark laboratory, we’ve been cooking up a special Chrome extension just for CloudShark users. Download the extension The extension adds the ability for Chrome users to right-click on a capture in the capture list view and go directly to an analysis tool, rather than opening the packet viewer first. It’s definitely something that’s been asked for by our users! In addition, we’ve uploaded the source of the extension as an open-source project on github.

Read the whole entry »

Tuesday, Sep 5, 2017

Using Column Presets in Wireless Analysis

Troubleshooting wireless problems often requires a deep dive down to the packet level. But with so much information in there, how do you know where to look first? CloudShark’s new Wireless profile preset helps set up your view to give you the summary columns you need. It’s a quick and easy way to get the most information about your network traffic. It all starts with the right profile Building on our own analysis experience, CloudShark has created a default profile for looking at 802.

Read the whole entry »

Monday, Aug 28, 2017

CloudShark for MSPs

If you’re a Managed Service Provider or other IT outsourcing company, chances are you’ve had to use packet capture on many occasions to help customers solve network problems. With the right analysis tools, packet captures can be your go-to resource to help you get to the root of problems faster and make customer interactions easier. Packet Capture: Your Greatest Asset For the Managed Service Provider, packet capture files are generally the quickest way to get to the root cause of a network, application, or security problem.

Read the whole entry »

Friday, Jul 28, 2017

Using the Wireless Networks tool to see other networks around you

When an wireless access point wants to advertise its available networks, it sends out 802.11 beacon frames. These frames are seen by other 802.11 receiving radios, and if you can capture those frames, you can use CloudShark’s Wireless Networks tool to see all of the wireless networks (named with their SSIDs) nearby. Alternatively, when Wifi stations come online, they may send out a frame called a “Probe Request”. An access point can respond to these requests with a “Probe Response”.

Read the whole entry »

Monday, Jul 24, 2017

Examining Network Delay with Wireless Retries

Ever since the folks at Aerohive decided to integrate HiveManger NG with CloudShark, we’ve been excited to play around see what exactly we can learn from looking at packet captures from wireless networks. So, naturally, our CloudShark dev and support guru Tom was happy to jump on it when we got some of their Access Points here at CloudShark. Our network is a bit tricky, since our sister product CDRouter is busy testing all sorts of broadband routers and wireless APs with their networks on, so he brought it out of the noise and tested it at home for a night.

Read the whole entry »

Thursday, Jul 13, 2017

Merging Captures from Multiple Wifi Radio Interfaces

Today’s Wireless Access Points have multiple radio interfaces (for the 2.4 GHz and 5 GHz ranges) that can both host Wifi clients. What if you want to see capture data from both? Aerohive’s HiveManagerNG lets you capture on both of these interfaces at the same time. This makes two different captures, but with CloudShark’s Merge feature you can put them together and view all of the packets going through your AP at once.

Read the whole entry »

Tuesday, Mar 7, 2017

Search Engine Indexing and CloudShark

The news cycle about cyber-security has been more active than ever before. When we launched CloudShark back in 2010, we knew there would be some hesitation in putting something as sensitive as packet captures in the cloud. While the world has grown since then, we wanted to write a quick note for transparency about how CloudShark data is contained and shared. How CloudShark Sessions Work Each upload to CloudShark generates a unique “session” URL.

Read the whole entry »

Monday, Mar 6, 2017

Introducing Threat Analysis in CloudShark

Watch the video. Cyber attacks today are bigger, faster, and happening more frequently than ever. Intrusion detection system alerts are only the beginning of the story. CloudShark Threat Assessment quickly takes you from the network alert all the way down to the individual packets, so you can determine the root cause and protect your network.

Read the whole entry »

Monday, Sep 19, 2016

Best Practices for Managing and Securing Network Capture Files

This article is the full text of our white paper on the same topic Packet Capture Files: Valuable but Vulnerable Packet capture files - files that record network traffic—are invaluable resources for network administrators, help desk staff, and IT security experts. Filled with application data and protocols, timestamps, and error codes, these files provide IT engineers with a detailed view of what took place on a network during a specific period of time.

Read the whole entry »

Friday, Sep 16, 2016

HIPAA, shadow IT, and the packet capture problem

Note: We here at CloudShark aren’t HIPAA experts, we just think its neat to talk about. Don’t take this as “official” advice. Recently we’ve been having some “water-cooler” (we don’t have a water cooler, it’s actually a shark tank) discussion around the security of packet captures in general, and naturally, how that applies to regulations like HIPAA, the “Health Insurance Privacy and Accountability Act”. HIPAA and packet captures The relevant parts of HIPAA to packet capture security include sections on workstation use and security, device and media controls (including rules for backup and storage), access controls to electronic resources, and a section that addresses transmission security, which requires encryption of those record during transmission.

Read the whole entry »

Thursday, Mar 31, 2016

Building a network capture probe with Raspberry Pi

We were pretty excited when the developers at OpenWRT decided to build packet capture and CloudShark upload support into the popular open source software for broadband routers. It got us thinking - what are some other ways you could build a useful network probe? It turns out one of our other users decided to take the leap into building such capability using a Raspberry Pi. The great news is you can do it easily by installing tshark on your system and running a simple script from one of our developers, Tom.

Read the whole entry »

Wednesday, Feb 17, 2016

Capture of recently discovered glibc getaddrinfo() vulnerability

The folks at Google Security recently discovered a vulnerability in glibc’s getaddrinfo() library function, allowing attackers to execute malicious code transmitted in oversized DNS replies. Scary stuff! Luckily, there’s already a patch, and the developers generated some proof of concept code to demonstrate the vulnerability. We took that code and ran it against some of our own systems. You can see a packet capture of the whole thing here:

Read the whole entry »

Tuesday, Dec 15, 2015

Merging and splitting captures in CloudShark

Watch the video. Export captures to a new session based on filter rules Merge captures from multiple sources or times into a single capture When we first made CloudShark, we stuck to making the best and easiet to use packet capture analysis tool out there. As we made more and more improvements to CloudShark and its host of analysis tools, we’ve gotten many requests for the ability to manipulate the captures themselves - whether it be splitting them into smaller, more manageable sizes or performing a capture merge that can put two sets of packet data in order and remove duplicates.

Read the whole entry »

Wednesday, Sep 9, 2015

How do you have captures automatically expire?

Watch the video. One of our most requested features that we added to CloudShark 2.6 was the ability to have captures automatically delete after a certain time period has expired. Since CloudShark can hold a virtually unlimited number of captures, this is useful for those who wish to preserve disk space or have specific retention rules due to their company’s security policy or from regulations like HIPPA. Using this feature is very simple!

Read the whole entry »

Thursday, Jul 2, 2015

How do you debug web applications that use encrypted channels?

Well, it’s official; the IETF has officially deprecated SSLv3.0. This means that it’s now a protocol violation to fall back to it. This is good news, since the number and types of attacks have been on the rise for awhile now. We’d like to take the opportunity to explore how to debug web applications that use HTTPS over SSL/TLS in CloudShark. It’s undeniable that debugging HTTP traffic is one of the most common use-cases for a packet decoder.

Read the whole entry »

Thursday, May 14, 2015

All about SSL key logging

In CloudShark 2.5, we added the ability to use SSL key log file data in order to decrypt SSL streams in the packet viewer. But what exactly is an SSL key log file, and how do you get them so that you can do web site and web service debugging? A key log is a log of the values used by your web browser to generate TLS session keys. Your browser does this every time, but it doesn’t do anything else with those values once they are used.

Read the whole entry »

Monday, Apr 27, 2015

Using a bandwidth preview to triage captures

CloudShark 2.5, added a cool new feature: the ability to view a small sparkline graph of each of your captures packets-per-second (bandwidth). You can add this to your index view by editing the table options in your capture file index. How might such a thing be useful? Quickly noticing patterns Some issues can be seen in the regularity of certain traffic patterns. For instance, seeing packet rate spikes occur at regular intervals can point to a rogue agent on your network attempting some funny business, or issues with applications trying to accomplish some network heavy task, then repeating it when it is unsuccessful.

Read the whole entry »

Friday, Apr 24, 2015

Captures and Analysis of the QUANTUMINSERT Attack

We now know a lot about the NSA’s various techniques in its QUANTUM program. One of the most prolific (and sneaky) of these attacks is the “QUANTUMINSERT”, which exploits a long-known TCP vulnerability that will cause, effectively, a redirect to a malicious resource. It’s tricky, since it requires careful timing; the spoofed packet needs to arrive before the expected packet. One of our most engaging customers, Fox-IT, is an active team of hackers, programmers, and cybersecurity experts that provides innovative solutions for government, defense, law enforcement, critical infrastructure, banking, and commercial enterprise clients worldwide.

Read the whole entry »

Tuesday, Apr 7, 2015

Running CloudShark on Amazon Web Services

Check out how to do it here: Watch the video. We’re pleased to say you can now easily install CloudShark on Amazon Web Services with just a few simple steps. CloudShark on AWS lets you maintain full control over your server without the added headaches of managing physical servers or VM infrastructure. You can get set up in minutes, whether you’re running a CloudShark trial or you’ve just purchased CloudShark and are ready to get going.

Read the whole entry »

Wednesday, Jan 7, 2015

Heartbleed, Poodle, Shellshock, and the Sony Hack - Big Security Breaches of 2014

If there’s one thing we noticed about 2014, it was a year of many security announcements. It is becoming obvious that perimeter security is not sufficient and each constituent system in a network must be regarded as a public system, regardless of assumption. Systems will be compromised, and preparing for what to do after an attack is just as important as preventing attacks in the first place. In any case, we thought we’d do a quick review:

Read the whole entry »

Tuesday, Sep 2, 2014

Wireshark in the Web - An Introduction to Collaborative Packet Analysis (Webinar)

Watch the video. If you are new to CloudShark Enterprise or diving into our 30-day free trial, or even just curious about how you can organize, analyze, and collaborate on packet captures in your browser, please join the CloudShark support team as we show you the basics: Your first log-in to CloudShark Enterprise Searching, tagging, and organizing Annotating and analyzing in the packet capture viewer Sharing links and embedding views Using CloudShark with the Wireshark plug-in

Read the whole entry »

Monday, Jul 28, 2014

How to build a network probe with OpenWrt and CloudShark

We’re always geeking out over the multitude of things you can do with packet capture and CloudShark upload support in the popular open source OS for embedded devices, OpenWrt. In addition to the ability to troubleshoot packet-level detail on home gateways, or monitoring wireless traffic, OpenWrt’s packet capture feature can turn any embedded device to a packet capture node that can instantly upload its data to CloudShark. Accessing OpenWrt To turn a device into a network probe, you’ll need to be able to access the web user-interface of OpenWrt.

Read the whole entry »

Monday, Jun 30, 2014

Capturing Smartphone Traffic With OpenWrt and CloudShark

Have you ever wanted to capture and analyze what network traffic your smartphone or tablet is sending? Maybe you are developing a new app and need to debug a network issue, or maybe you are just curious about what network traffic an app is sending. Using a wireless router running OpenWrt with the CloudShark package makes capturing this traffic easy! Once you have the OpenWrt CloudShark package installed connect your device to your OpenWrt wireless network and browse to the Status page of the OpenWrt router.

Read the whole entry »

Thursday, Jun 26, 2014

Embedding packets in other pages

Have you ever wanted to embed a packet trace right into the blog post you were writing? We know you have. You’ve told us you want that! When a screenshot of the decode won’t do, you can use CloudShark to share individual frame decodes in blog posts, documentation, help forums, and pretty much anywhere else you can write HTML. Let’s see it in action! Here’s packet #2 from our TCP Fast open example.

Read the whole entry »

Wednesday, Jun 18, 2014

Uploading Captures From OpenWrt to CloudShark

Those in the CPE world are probably very familiar with OpenWrt, an open source linux implementation for embedded devices, including home gateways or wireless routers. OpenWrt is popular and extensible, with over 3000 available packages. Recently, an OpernWrt package was developed that adds QA Cafe CloudShark capture and upload capability. The new package supports packet capture and viewing directly in the browser. A home router can be instantly transformed into a network troubleshooting tool or probe.

Read the whole entry »

Tuesday, Jun 10, 2014

Uploading to CloudShark using OS X Finder

Here in the CloudShark QA Department, we use many open source tools to accelerate our testing process - Capybara, JMeter, and Vagrant are each friends and family to our QA lab. When new product development zooms past the faithful heartbeat of test automation, every QA department in the world needs to fess up - manual testing helps get the job done. One of the most useful ways of testing future versions of CloudShark is also a way to get some extra testing for free: the robust CloudShark API allows for hands-free manipulation of CloudShark packet capture assets.

Read the whole entry »

Friday, May 2, 2014

Five Reasons to Move to the Pcapng Capture Format

The pcap capture file format has been the universal packet capture format since the early days of computer networking. Almost all capture tools support the pcap format. And while vendors have created new formats over the years, most tools support conversion into the pcap format. While pcap continues to be used today, it does have some limitations that make other formats more attractive. A new format called “pcapng” has been under development for a number of years.

Read the whole entry »

Wednesday, Apr 9, 2014

Packet Capture of Heartbleed in Action

As many are aware (as it’s now become national news), a vulnerability was recently discovered in OpenSSL dubbed Heartbleed. The attack centers around the implementation of the Heartbeat extension in OpenSSL which causes a server to return the contents of memory that should be protected. This blogpost by Troy Hunt describes the vulnerability in detail: Everything you need to know about the Heartbleed SSL bug. Being packet geeks, naturally we wanted to get a capture of the Heartbleed attack in action.

Read the whole entry »

Tuesday, Jan 21, 2014

Using the CloudShark Improved Search API

CloudShark 2.0 added a lot of cool new features to CloudShark, but perhaps the most powerful (and most complex) was the addition of search capability to the CloudShark API. The search API function takes the already robust search features of CloudShark that were available through the user interface and brings them to anyone who wants to integrate CloudShark with their existing tools or work CloudShark seamlessly into their automation environment.

Read the whole entry »

Thursday, Dec 12, 2013

CloudShark G.722 decode support

In CloudShark 1.9 we added the ability to play back RTP streams so that you can replay voice data embedded in packet captures for call quality analysis. When we launched this feature, CloudShark supported G.711, G.729, and GSM voice codecs, used by many voice and mobile providers. Since then, we’ve gotten a lot of calls (ha!) for the addition of other audio codecs to the system to be able to play them back as well.

Read the whole entry »

Tuesday, Oct 29, 2013

Streaming Live Captures to CloudShark

We’ve been talking a whole lot about integration lately. From our recent bout at Cisco Toolapalooza, to the great work that’s being done with Meraki, we’re finding that the best way people get comfortable with CloudShark is by incorporating it into their existing tools. There are a great many tools out there that can produce packet captures, and each one can find a different way to get those captures into CloudShark for easier collaboration and management.

Read the whole entry »

Wednesday, Oct 16, 2013

Customizing Your CloudShark Experience

We know how life can be when someone else drives your car, and all of your “preferences” - the seat position, mirror views, and your “greatest hits of 1991” satellite radio station are all modified. Or worse, imagine if you had to set them every time you got in the car! We can see how that would be super annoying (like the greatest hits of 1991*). Fortunately for CloudShark, you can actually configure certain packet capture view preferences and save them so that you’ll see things the way you want to every time you look at a capture.

Read the whole entry »

Tuesday, Sep 17, 2013

Wireshark Preferences File and RTP Streams

CloudShark 1.9 includes the ability to visualize RTP streams and play them back if they contain audio. For SIP calls, CloudShark will automatically decode the conversation as an RTP stream. However, for other protocols RTP will generally use a random port - not immediately apparent to CloudShark. You can easily work around this using CloudShark’s “decode as” feature, which tells CloudShark to treat data on a given port as a particular protocol of your choice.

Read the whole entry »

Tuesday, Aug 27, 2013

Using Annotations in Graphs

One of CloudShark’s main and most useful features is the ability to add annotations to individual packets, or to import packet comments from the pcap-ng format into CloudShark annotations. Not only does this make your own note-taking on your analysis easier, but allows you to share your annotations with your colleagues or customers when sharing the capture file URL. They can see your notes and get to the root of the problem faster.

Read the whole entry »

Thursday, Feb 7, 2013

Intel "Packet of Death" Capture

UPDATE: Here is Intel’s official statement - it is important to note that this had little to do with Intel and only a specific manufacturer. The creator of AstLinux, Kristian Kielhofner, recently discovered a bug in certain model and version of Intel based Gigabit Ethernet implementations that can result in a “packet of death” that will bring down the network interface, requiring a power cycle of the interface in order to restore functionality.

Read the whole entry »

Tuesday, Jan 29, 2013

MITM Attack Capture Shared Through CloudShark

Last weekend, an apparent Man-In-The-Middle (MITM) Attack on the popular code sharing site occurred, which seemed to originate from China for users trying to traverse the “Great Firewall”. This was strange, as there had been many news stories not even two days before about China blocking and then subsequently unblocking access to github. Whatever the reason, a subject of the attack was able to create a packet trace of it, and uploaded it to our free cloudshark.

Read the whole entry »

Wednesday, Jun 6, 2012

Search for *anything* in a capture - did you know?

The great thing about CloudShark’s capture decode is that it supports all of the standard Wireshark display filters. You may know the common ones, such as searching on ip address or tcp port, or even protocol; but did you know you can search for any ASCII or Hex values in any field throughout the capture? It’s true. The “frame contains” filter will let you pick out only those packets that contain a sequence of any ASCII or Hex value that you specify.

Read the whole entry »



About Us

CloudShark is made by QA Cafe, a technology company based in Portsmouth, NH. Our passion for packet captures has grown out of our other product CDRouter.

Get in touch via our Contact us page or by following us on your favorite service: