What a UDP flood looks like in tcpdump
I set up a small lab to generate a UDP flood against my own honeypot, and watched it with tcpdump. The signature is distinctive once you have seen it. A walk through the patterns.
Long-form thinking on cyber defence, detection, and resilience — from Slackware-era honeypots through to AI-driven SOC analytics.
Showing posts tagged tcpdump — 2 results.
I set up a small lab to generate a UDP flood against my own honeypot, and watched it with tcpdump. The signature is distinctive once you have seen it. A walk through the patterns.
There is no substitute for actually looking at what your machine is sending and receiving. tcpdump has been around forever, and it is still the best tool for the job.