Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. today i wrote a thing for that tabletop im doing next week.its just a tcpdump parser, but its functionally an inventory/asset discovery tool.

today i wrote a thing for that tabletop im doing next week.its just a tcpdump parser, but its functionally an inventory/asset discovery tool.

Scheduled Pinned Locked Moved Uncategorized
8 Posts 6 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • viss@mastodon.socialV This user is from outside of this forum
    viss@mastodon.socialV This user is from outside of this forum
    viss@mastodon.social
    wrote last edited by
    #1

    today i wrote a thing for that tabletop im doing next week.
    its just a tcpdump parser, but its functionally an inventory/asset discovery tool. it builds a list of discovered hosts and nabs additional packets from them that leaks what they are and what they do.

    the endpoint its running on is a gl.inet slate-ax. inside of 30 seconds its told me more about the lan than nmap could in ten times as long.

    im blown away

    itgrrl@infosec.exchangeI tim_lavoie@cosocial.caT sassdawe@infosec.exchangeS davemwilburn@infosec.exchangeD 4 Replies Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    • viss@mastodon.socialV viss@mastodon.social

      today i wrote a thing for that tabletop im doing next week.
      its just a tcpdump parser, but its functionally an inventory/asset discovery tool. it builds a list of discovered hosts and nabs additional packets from them that leaks what they are and what they do.

      the endpoint its running on is a gl.inet slate-ax. inside of 30 seconds its told me more about the lan than nmap could in ten times as long.

      im blown away

      itgrrl@infosec.exchangeI This user is from outside of this forum
      itgrrl@infosec.exchangeI This user is from outside of this forum
      itgrrl@infosec.exchange
      wrote last edited by
      #2

      @Viss 👀

      1 Reply Last reply
      0
      • viss@mastodon.socialV viss@mastodon.social

        today i wrote a thing for that tabletop im doing next week.
        its just a tcpdump parser, but its functionally an inventory/asset discovery tool. it builds a list of discovered hosts and nabs additional packets from them that leaks what they are and what they do.

        the endpoint its running on is a gl.inet slate-ax. inside of 30 seconds its told me more about the lan than nmap could in ten times as long.

        im blown away

        tim_lavoie@cosocial.caT This user is from outside of this forum
        tim_lavoie@cosocial.caT This user is from outside of this forum
        tim_lavoie@cosocial.ca
        wrote last edited by
        #3

        @Viss Does it need to be listening on that host, or do you just feed it pcaps from whatever's listening?

        viss@mastodon.socialV 1 Reply Last reply
        0
        • tim_lavoie@cosocial.caT tim_lavoie@cosocial.ca

          @Viss Does it need to be listening on that host, or do you just feed it pcaps from whatever's listening?

          viss@mastodon.socialV This user is from outside of this forum
          viss@mastodon.socialV This user is from outside of this forum
          viss@mastodon.social
          wrote last edited by
          #4

          @tim_lavoie well at present you pipe tcpdump srdout into it, so in theory if you pcapped the right way you could totally play back a pcap into it

          tim_lavoie@cosocial.caT 1 Reply Last reply
          0
          • viss@mastodon.socialV viss@mastodon.social

            @tim_lavoie well at present you pipe tcpdump srdout into it, so in theory if you pcapped the right way you could totally play back a pcap into it

            tim_lavoie@cosocial.caT This user is from outside of this forum
            tim_lavoie@cosocial.caT This user is from outside of this forum
            tim_lavoie@cosocial.ca
            wrote last edited by
            #5

            @Viss Ah, OK. I did some work on a fun side-project through work a few years back, with the idea of flagging any attempts to use unallocated (dark) IP space. Basically something that would run as a Docker container on one interface, but noting details to be syslogged somewhere on another. Not sure it got used, but did work.

            1 Reply Last reply
            0
            • viss@mastodon.socialV viss@mastodon.social

              today i wrote a thing for that tabletop im doing next week.
              its just a tcpdump parser, but its functionally an inventory/asset discovery tool. it builds a list of discovered hosts and nabs additional packets from them that leaks what they are and what they do.

              the endpoint its running on is a gl.inet slate-ax. inside of 30 seconds its told me more about the lan than nmap could in ten times as long.

              im blown away

              sassdawe@infosec.exchangeS This user is from outside of this forum
              sassdawe@infosec.exchangeS This user is from outside of this forum
              sassdawe@infosec.exchange
              wrote last edited by
              #6

              @Viss interesting! I haven't considered that I could write custom "things" for my router.

              1 Reply Last reply
              0
              • viss@mastodon.socialV viss@mastodon.social

                today i wrote a thing for that tabletop im doing next week.
                its just a tcpdump parser, but its functionally an inventory/asset discovery tool. it builds a list of discovered hosts and nabs additional packets from them that leaks what they are and what they do.

                the endpoint its running on is a gl.inet slate-ax. inside of 30 seconds its told me more about the lan than nmap could in ten times as long.

                im blown away

                davemwilburn@infosec.exchangeD This user is from outside of this forum
                davemwilburn@infosec.exchangeD This user is from outside of this forum
                davemwilburn@infosec.exchange
                wrote last edited by
                #7

                @Viss

                So kind of like @lcamtuf 's p0f but using tcpdump as the backend instead of a custom libpcap-based tool?

                Way back in the day, I also remember there was a commercial tool called Beacon from a company called Great Bay. I never got to use it personally, but some friends of mine did and said it worked great.

                It's a shame these kinds of tools haven't caught on more. A lot of IT inventory approaches seem to assume that most of your hosts are actively managed general purpose computers that can accommodate an endpoint agent. That was never a great assumption, and it has only gotten worse over time.

                tomsellers@infosec.exchangeT 1 Reply Last reply
                0
                • davemwilburn@infosec.exchangeD davemwilburn@infosec.exchange

                  @Viss

                  So kind of like @lcamtuf 's p0f but using tcpdump as the backend instead of a custom libpcap-based tool?

                  Way back in the day, I also remember there was a commercial tool called Beacon from a company called Great Bay. I never got to use it personally, but some friends of mine did and said it worked great.

                  It's a shame these kinds of tools haven't caught on more. A lot of IT inventory approaches seem to assume that most of your hosts are actively managed general purpose computers that can accommodate an endpoint agent. That was never a great assumption, and it has only gotten worse over time.

                  tomsellers@infosec.exchangeT This user is from outside of this forum
                  tomsellers@infosec.exchangeT This user is from outside of this forum
                  tomsellers@infosec.exchange
                  wrote last edited by
                  #8

                  @DaveMWilburn @Viss
                  Yeah, tons of services love to tell you what they are. We've had quite a bit of success with it as part of runZero. We support pap imports as well as live capture. It is great for easing into networks, such as OT, where active scanning is a concern.

                  1 Reply Last reply
                  1
                  0
                  Reply
                  • Reply as topic
                  Log in to reply
                  • Oldest to Newest
                  • Newest to Oldest
                  • Most Votes


                  • Login

                  • Login or register to search.
                  • First post
                    Last post
                  0
                  • Categories
                  • Recent
                  • Tags
                  • Popular
                  • World
                  • Users
                  • Groups