Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Keep a trail of breadcrumbs for people wanting to get started. #2

Open
elijah opened this issue Jul 27, 2020 · 0 comments
Open

Keep a trail of breadcrumbs for people wanting to get started. #2

elijah opened this issue Jul 27, 2020 · 0 comments

Comments

@elijah
Copy link

elijah commented Jul 27, 2020

Keep a list of useful getting-started points for people who're interested in doing this kind of work.

Flying off the tails of the suricata ssh-decoder that was just submitted, here's a pointer to a demo of how to do wireshark protocol-dissectors in Rust.

https://github.com/sevagh/wireshark-dissector-rs

This has been one of the most common ways to attack wireshark over the years. [Which usually runs with an unusual amount of network access, on a privileged machine, by a user who should know better than to run his process as root....]

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant