

Matches source or destination port for tcp protocol. Good for extracting CC for malware using SSL. It can be used to match any file type magic bytes which is present in http filedata. Match the given case-insensitive Perl-compatible regular expression(PCRE) with file_data. You can also search using hex instead of ascii strings. It is very useful if you are looking for specific strings. This can be also good starting point to check if malware is sending any http request to CC. It can be used to filter when you know ip address of CC/victim machine.ĭisplay all types of http request e.g GET, POST etc. Matches against both the IP source and destination addresses in the IP header. It can be used as starting point in analysis for checking any suspicious dns request or http to identify any CC. It will show all the packets with protocol dns or http.

This not filter can be used when you want to filter any noise from specific protocol
