How to Leverage PowerShell to Create a User- Friendly Version of WinDump

"WinDump is often used to analyze packet captures by incorporating Berkeley Packet Filters, to reduce large captures into manageable subsets. The filtering makes use of macros to easily specify common protocol properties, however, analyzing other properties requires a deeper understanding of the protocol and more complicated expressions. PowerShell is a Windows scripting language that has become increasingly popular within the security community. PowerShell is extremely extensible, and can be used to develop an easy way to interact with WinDump. This paper will demonstrate how to write a custom PowerShell module that serves as a wrapper around WinDump, enabling an easier and more intuitive way of unleashing the power of WinDump. "

Spotlight

Safari Micro

Founded in 1997, Safari Micro is a value added reseller (“VAR”) of IT hardware, software, and services (cloud computing; network infrastructure; storage; security; endpoint solutions; managed services; etc.) to businesses, school districts, state municipalities, and governmental agencies of all sizes across the United States. Since our inception, we have steadily grown by being laser focused on both the needs of our customers and employees…because we truly believe that happy employees equates to happy customers. By consistently building and nurturing extremely strong partnerships in this industry with manufacturers and distributors of all sizes, our sales and IT services professionals are able to efficiently provide our customers with everything that they need, exactly when they need it. Since 1997, have succeeded in hiring and retaining a growing team of highly experienced IT professionals, the vast majority of whom have spent their entire career navigating the ever-changing landsc

OTHER WHITEPAPERS
news image

The Trusted Data Security Solution for Cyber Recovery

whitePaper | December 30, 2022

Digital transformation has brought significant benefits to organizations, including increased agility and flexibility, but it has also led to a rise in cyber attack vectors. 66% of organizations were hit with ransomware within the last year, according to a 2022 Sophos survey. The widespread adoption of cloud services and Software-as-aService (SaaS) applications has expanded the attack surface, making it more challenging to manage and secure data. Additionally, the increased use of mobile devices and remote work have made it easier for cybercriminals to launch attacks from anywhere, at any time.

Read More
news image

Dell VxRail: Comprehensive Security by Design

whitePaper | September 29, 2022

In today’s world, business organizations and individuals have become accustomed to accessing the information they need 24 hours a day, seven days a week, often within seconds of making a request. To illustrate, an ad marketing study conducted by Google found that 53% of website sessions are terminated if pages take longer than three seconds to load.

Read More
news image

The Trellix Approach to Effective Cloud Security

whitePaper | October 27, 2022

In many ways, the cloud1 is more secure than a traditional data center. Asset management, inventory, audit logging, two-factor access controls, connectivity redundancy and firewalls are built into the cloud provider platform. Servers are easier to patch and won’t become outdated within a few years; there aren’t any forgotten boxes sitting in a dark corner with a note reading, “DO NOT TURN OFF.” However, assets on the cloud continue to be compromised, just as those stored in traditional data centers.

Read More
news image

Intel® Converged Security and Management Engine (Intel® CSME) Security

whitePaper | October 26, 2022

Intel platforms are designed with a strong built-in security foundation. This allows the ecosystem partners to help protect the platform data and to build more trusted applications.

Read More
news image

AWS Best Practices for DDoS Resiliency

whitePaper | December 5, 2019

You work to protect your business from the impact of Distributed Denial of Service (DDoS) attacks, as well as other cyberattacks. You want to keep your customers’ trust in your service by maintaining the availability and responsiveness of your application. And you want to avoid unnecessary direct costs when your infrastructure must scale in response to an attack.

Read More
news image

XDR vs. SIEM: A Cybersecurity Leader’s Guide

whitePaper | December 27, 2022

As threats intensify and SecOps teams are called upon to defend digital environments that keep growing in size and complexity, and with a defensible perimeter that has all but disappeared, cybersecurity vendors are responding with a new generation of software and service solutions.

Read More

Spotlight

Safari Micro

Founded in 1997, Safari Micro is a value added reseller (“VAR”) of IT hardware, software, and services (cloud computing; network infrastructure; storage; security; endpoint solutions; managed services; etc.) to businesses, school districts, state municipalities, and governmental agencies of all sizes across the United States. Since our inception, we have steadily grown by being laser focused on both the needs of our customers and employees…because we truly believe that happy employees equates to happy customers. By consistently building and nurturing extremely strong partnerships in this industry with manufacturers and distributors of all sizes, our sales and IT services professionals are able to efficiently provide our customers with everything that they need, exactly when they need it. Since 1997, have succeeded in hiring and retaining a growing team of highly experienced IT professionals, the vast majority of whom have spent their entire career navigating the ever-changing landsc

Events