GQUIC Protocol Analyzer Logo

GQUIC Protocol Analyzer

0
Free
Visit Website

This analyzer parses GQUIC traffic in Zeek for logging and detection purposes. It examines the initial exchange between a client and server communicating over GQUIC, and extracts the information contained in the connection's client hello packet and server rejection packet. Currently, this protocol analyzer supports GQUIC versions Q039 to Q046. Installing the GQUIC Protocol Analyzer using Source Tree: For a standard installation: ./configure --zeek-dist=/path/to/zeek/dist make make install To see all options, including setting the install path, run: ./configure --help To provide further insight and help detect anomalous (and potentially malicious) GQUIC traffic, fingerprinting is utilized. The fingerprinting method, named "CYU" works by identifying the GQUIC version and tags present in client hello packets. First, the version of the packet is extracted, immediately followed by a comma. After this, each tag in the client hello packet is gathered and concatenated together with hyphens to delimit each tag. For example: 46,PAD-SNI-STK-VER-CCS-NONC-AEAD-UAID-SCID-TCID-PDMD-SMHL-ICSL-NONP-PUBS-MIDS-SCLS-KEXS-XLCT-CSCT-COPT-CCRT-IRTT-CFCW-SFCW. After this string, i

FEATURES

ALTERNATIVES

Snort 3 is the next generation Snort IPS with enhanced features and improved cross-platform support.

A simple IOC scanner bash script for Linux/Unix/OSX systems

A script for extracting network metadata and fingerprints such as JA3 and HASSH from packet capture files or live network traffic.

Chaosreader is a tool for ripping files from network sniffing dumps and replaying various protocols and file transfers.

A daemon for blocking USB keystroke injection devices on Linux systems

A tool for taking a list of resolved subdomains and outputting any corresponding CNAMES en masse.

Automated SSRF finder with options for XSS and open redirects

A technique to encode data within DNS queries for covert communication channels.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved