Capturing and Analyzing Packets with Perl

While many useful tools exist to aid the intrusion analyst in reviewing packet information such as Wireshark and Snort, sometimes they don't do exactly what you need them to do. What if you need to manipulate the data in a field before logging it, need to use your own timestamp format, or need to...
By John Brozycki
January 28, 2010

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg