Have you ever opened Wireshark and thought, "this is nice, but sometimes filtering and following TCP streams is tedious?" If not, open Wireshark more. In this post, I'll cover how to leverage Python, Scapy, Pandas, and Seaborn to science the shit out of some PCAP. Also, this post will serve as a prequel for our next series on Packet Manipulation with Data Science.
I've provided a blog post for the this project, follow the links below!
- Learning Packet Analysis with Data Science
- For content related to development, security, devops, AI, etc... check out SecDevOps.AI!
docker build . -t packet-analytics
docker run -i -t --rm -p 8888:8888 packet-analytics
cd packet-analytics
anaconda-project run