fatt Logo

fatt

0
Free
Visit Website

A script for extracting network metadata and fingerprints such as JA3 and HASSH from packet capture files (pcap) or live network traffic. The main use-case is for monitoring honeypots, but you can also use it for other use cases such as network forensic analysis. fatt works on Linux, macOS and Windows. Note that fatt uses pyshark (a python wrapper for tshark) and therefore the performance is not great! But that's not a big issue as obviously this is not a tool you use in production. You can use other network analysis tools such as Bro/Zeek, Suricata or Netcap for more serious use cases. Joy is another great tool you can use for capturing and analyzing network flow data. Other than that, I'm working on a go based version of fatt which is faster, and you can use its libraries in your gopacket based tools such as packetbeat. I released the initial version of its gQUIC library (QUICk). Features Protocol support: SSL/TLS, SSH, RDP, HTTP, gQUIC. To be added soon: IETF QUIC, MySQL, MSSQL, etc.

FEATURES

ALTERNATIVES

A wireless network detector, sniffer, and intrusion detection system

Open source software for leveraging insights from flow and packet analysis to identify potential security threats or attacks.

A honeytoken-based tripwire for Microsoft's Active Directory to detect privilege escalation attempts

A honeypot that logs NTP packets into a Redis database to detect DDoS attempts.

A tool for analyzing TCP packet traces with color support.

A simple Docker-based honeypot to detect port scanning

A tool for extracting files from network traffic based on file signatures with support for various file formats and scalable search algorithm.

An intrusion prevention system for SSH that blocks IP addresses after a set number of consecutive failed login attempts.

PINNED