Latest Updates

The A-Packets Blog

Deep-dive tutorials, threat-hunting playbooks, and the latest in packet-capture analytics.

How to Analyze Encrypted Traffic in PCAP Files: A Guide with A-Packets

This in-depth article explores how to analyze encrypted traffic using PCAP files, focusing on monitoring SSL/TLS sessions for potential vulnerabilities without decrypting the data. Learn how A-Packets can help identify security risks like expired certificates, weak cipher suites, and anomalies such as Heartbleed attacks. By examining metadata such as client and server encryption algorithms, cipher suite distribution, and certificate validity, A-Packets offers valuable insights into network security. Discover the key aspects of encrypted traffic analysis and how proactive monitoring with A-Packets can safeguard your network from potential threats.

Mastering DNS Traffic Analysis: Exploring DNS, mDNS, and NBNS with A-Packets

Discover how A-Packets' DNS Exploring Section empowers system administrators, security engineers, and IT professionals to analyze DNS, mDNS, and NBNS traffic with ease. Learn to diagnose DNS failures, visualize client-DNS server communications, and gain detailed insights into node activity including DNS name, IP, and geo-location. Unlock the full potential of PCAP analysis with comprehensive tools for monitoring and securing your network.

Extracting Credentials from PCAP Files

Learn how to extract credentials from PCAP files using A-Packets. Supports various protocols including IMAP, SMTP, HTTP, Telnet, FTP, SMB, and more. View consolidated results in the Credentials tab.

How to Submit a PCAP File Deletion Request

Learn how to easily submit a PCAP file deletion request on our analysis platform. This guide covers the steps for users of the free version, where manual requests are needed, and explains how paid subscribers can delete their files anytime with full control. Follow our step-by-step process to ensure your request is processed smoothly and efficiently.