8000 PCAP Analysis documentation improvement by David-BMS · Pull Request #10004 · demisto/content · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

PCAP Analysis documentation improvement #10004

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 6 commits into from
Dec 30, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 11 additions & 1 deletion Packs/PcapAnalysis/Playbooks/playbook-PCAP_Analysis_README.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,14 @@
This playbook leverages all of the PCAP miner and PCAP file extractor sub playbook capabilities, including: * Search for specific values in a PCAP file * Parse and enrich detected indicators such as IP addresses, URLs, email addresses and domains found by the search . * Carve (extract) files found in the http, smb and other protocols and perform enrichment and detonation.
This playbook leverages all of the PCAP miner and PCAP file extractor sub playbook capabilities, including:
* Search for specific values in a PCAP file
* Parse and enrich detected indicators such as IP addresses, URLs, email addresses and domains found by the search .
* Carve (extract) files found in the http, smb and other protocols and perform enrichment and detonation.

The playbooks is meant to be a demonstration of all the PCAP analysis capabilities however it is more likely to use each of the subplaybooks seperatly. In order to demonstrate the entire flow make sure that at least on of the following playbook inputs is configured in order for search results to exist.
* IPAddressToSearch
* TCPPortsToSearch
* UDPPortsToSearch
* ProtocolToSearch
* AdvancedSearchFilter

## Dependencies
This playbook uses the following sub-playbooks, integrations, and scripts.
Expand Down
22 changes: 13 additions & 9 deletions Packs/PcapAnalysis/README.md
Original file line number Diff line number Diff line change
@@ -1,16 +1,20 @@
A common use case in incident response and forensics is analyzing network traffic and protocols by using network packet capture files as part of an investigation. PCAP files provide all the critical traffic data such as IP addresses in use, protocols, as well as the actual payload of the traffic itself.
The PCAP Analysis pack includes the PCAP Miner V2 script as well as playbooks that automate the process of searching for and summarizing data within PCAP files, extracting indicators, decrypting traffic, and more. Cortex XSOAR can leverage the power of Wireshark to parse, search, and extract data from PCAP files.
With this content pack, you can significantly reduce the time and effort by automating the process of analysing PCAP files and not miss out on critical data that can be extracted from them.
The PCAP Analysis pack includes the PCAP Miner V2 script, as well as playbooks that automate the process of searching for and summarizing data within PCAP files, extracting indicators, decrypting traffic, and more. Cortex XSOAR can leverage the power of Wireshark to parse, search, and extract data from PCAP files.
With this content pack, you can significantly reduce the time and effort by automating the process of analyzing PCAP files and not miss out on critical data that can be extracted from them.
The PCAP Analysis playbook is meant to demonstrate the full range of PCAP analysis capabilities, however, the most common use case is to use each of the sub-playbooks separately. Review each playbook README for configuration details.

##### What does this pack do?

The script and playbooks included in this pack help you automate repetitive tasks associated with PCAP files:
Searching PCAP files for common objects such as IP addresses, ports, protocols, or custom search filters just like in Wireshark.
- Search PCAP files for common objects such as IP addresses, ports, protocols, or custom search filters just like in Wireshark.
- Search for specific regex patterns with the payload.
- Parse and extract protocol-specific data for several common protocols such as DNS, HTTP, and many more.
- Display summarized search results.
- Decrypt various encrypted traffic such as SSL and WPA (as long as decryption keys are provided).
- Extract indicators such as IP addresses, URLs, domains, and files from the payload and perform enrichment on those indicators.

- Searching for specific regex patterns with the payload.
- Parsing and extracting protocol specific data for several common protocols such as DNS, HTTP and many more.
- Displaying summarized search results.
- Decrypting various encrypted traffic such as SSL and WPA (provided decryption keys are provided).
- Extracting indicators such as IP addresses, URLs, domain, files from the payload and performing enrichment on those indicators.
_We encourage you to [learn more about the PCAP Analysis playbook](https://xsoar.pan.dev/docs/reference/playbooks/pcap-analysis)_

## Demo Video
[![PCAP Analysis in Cortex XSOAR](https://img.youtube.com/vi/VDUdBmGuVYQ/0.jpg)](https://www.youtube.com/watch?v=VDUdBmGuVYQ "PCAP Analysis in Cortex XSOAR")

_For more information, visit our [Cortex XSOAR Developer Docs](https://xsoar.pan.dev/docs/reference/playbooks/pcap-analysis)_
0