
In session three in which I exported suspicious and malicious content, I used the following for example to identify the name of the malicious file: However, when looking at packets for patterns, sequence of bytes, etc., do we really need to leverage grep or another external tool? Let's see. Many times, when looking at packets or logs, I leverage " grep -perl-regexp". While I did not do blog posts for those (and I wish I had thought about it before), I've chosen to do a blog post for the TShark and working with regular expressions, In a session prior to these, I focused on Full Packet Capturing with TShark for Continuous Monitoring & Threat Intel via IP, Domains, & URLS. In the 3rd session, we extracted suspicious and malicious content from PCAPS. In the second session, we focused on reconnaissance at the transport layer and working with some common application protocols. In the first of those videos, we did an intro to TShark by focusing on reconnaissance at the IP layer. As a result, I produced some videos using TShark. However, the "& 0xffffff00" expression masks off the fourth byte.Recently, I've been working with the SANS Institute on some Livestream sessions, promoting the SEC503: Intrusion Detection In Depth class. Unfortunately, you want to examine three bytes, but you can only put 1, 2, or 4 after the colon, so three is not a valid value. In the capture filter expressions "ether" and "ether", 0 and 6 are the starting bytes for the destination MAC address field and the source MAC address field respectively, and 4 is the number of bytes to examine. To capture packets where either the source or destination MAC address starts with 00:0C:22: But if you know where in the MAC address field those three bytes will be, you can use a byte-offset capture filter. You probably can't create a capture filter for MAC addresses containing 00:0C:22 anywhere in the MAC address fields.


You said, "I want to capture all traffic from devices with MAC address containing 00:0C:22."
