<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Monitoring Android Traffic with Wireshark</title>
	<atom:link href="http://www.epanorama.net/blog/2014/09/23/monitoring-android-traffic-with-wireshark/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2014/09/23/monitoring-android-traffic-with-wireshark/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 14 Apr 2026 09:32:54 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/09/23/monitoring-android-traffic-with-wireshark/comment-page-3/#comment-1873149</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 12 Mar 2026 20:24:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27017#comment-1873149</guid>
		<description><![CDATA[Publicly available PCAP files
This is a list of public packet capture (PCAP) repositories, which are freely available on the Internet.
https://www.netresec.com/?page=PcapFiles]]></description>
		<content:encoded><![CDATA[<p>Publicly available PCAP files<br />
This is a list of public packet capture (PCAP) repositories, which are freely available on the Internet.<br />
<a href="https://www.netresec.com/?page=PcapFiles" rel="nofollow">https://www.netresec.com/?page=PcapFiles</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/09/23/monitoring-android-traffic-with-wireshark/comment-page-3/#comment-1872393</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 03 Mar 2026 14:33:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27017#comment-1872393</guid>
		<description><![CDATA[https://wireview.github.io/

This is in browser wireshark like pcap file analyzer 
Implemented with WASM]]></description>
		<content:encoded><![CDATA[<p><a href="https://wireview.github.io/" rel="nofollow">https://wireview.github.io/</a></p>
<p>This is in browser wireshark like pcap file analyzer<br />
Implemented with WASM</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/09/23/monitoring-android-traffic-with-wireshark/comment-page-3/#comment-1872316</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Mar 2026 12:16:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27017#comment-1872316</guid>
		<description><![CDATA[https://wiki.wireshark.org/samplecaptures#iec-61850-9-2]]></description>
		<content:encoded><![CDATA[<p><a href="https://wiki.wireshark.org/samplecaptures#iec-61850-9-2" rel="nofollow">https://wiki.wireshark.org/samplecaptures#iec-61850-9-2</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/09/23/monitoring-android-traffic-with-wireshark/comment-page-3/#comment-1872315</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Mar 2026 12:16:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27017#comment-1872315</guid>
		<description><![CDATA[Google Gemini can read pcap files]]></description>
		<content:encoded><![CDATA[<p>Google Gemini can read pcap files</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: url</title>
		<link>https://www.epanorama.net/blog/2014/09/23/monitoring-android-traffic-with-wireshark/comment-page-3/#comment-1866638</link>
		<dc:creator><![CDATA[url]]></dc:creator>
		<pubDate>Tue, 09 Dec 2025 16:37:24 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27017#comment-1866638</guid>
		<description><![CDATA[It&#039;s going to be end of mine day, except before ending 
I am reading this fantastic post to improve my experience.]]></description>
		<content:encoded><![CDATA[<p>It&#8217;s going to be end of mine day, except before ending<br />
I am reading this fantastic post to improve my experience.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/09/23/monitoring-android-traffic-with-wireshark/comment-page-2/#comment-1856793</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 25 Jun 2025 21:40:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27017#comment-1856793</guid>
		<description><![CDATA[Automated Network Packet Analysis with Gemini AI and Scapy 
https://medium.com/the-last/automated-network-packet-analysis-with-gemini-ai-and-scapy-d049763d40b3

This project was developed as part of a graduate course at UVU, aiming to address a challenging problem in packet analysis. The assignment involved scanning and analyzing packets within a large PCAP file, with the objective of reviewing each packet and identifying potential vulnerabilities. Given that the file contained over 500 lines, I decided to automate the process by creating a tool to specifically detect HTTP requests like POST, PUT, DELETE, and other significant operations.

This automation enables efficient inspection between packets to identify any activity that warrants attention. When a relevant packet is detected, the tool generates a detailed report containing the following information: source IP, destination IP, protocol, payload size, a brief summary, an explanation of the issue, potential solutions, and recommended actions.

Manual packet analysis can be time-consuming, especially when dealing with large datasets. 

This script reads PCAP files, extracts packet details, and uses Google’s Gemini AI to explain packet behavior and suggest security solutions.

Scapy is a powerful library for packet manipulation and analysis. The script reads packets from .pcap files

Using Gemini AI (gemini-pro model), the script generates a human-readable explanation for each packet summary.

The script dynamically asks Gemini AI to suggest potential security fixes or improvements based on the explanation.

The details, explanations, and solutions are formatted into a comprehensive report for each packet.

The script can process all PCAP files in a specified folder and save detailed reports in an output folder.

Why Use This Tool?

    Efficient Analysis: Process multiple PCAP files quickly.
    AI-Powered Insights: Gemini AI helps explain complex packets and generate tailored security recommendations.
    Automated Reporting: Generates organized reports to simplify your workflow.


 Final Thoughts

Automating network analysis with AI can save valuable time and enhance your ability to detect and mitigate security issues. This script combines the power of Scapy for packet analysis and Gemini AI to generate insights and solutions.

Ready to give it a try? Clone or adapt this script — https://github.com/hvaandres/PcapAnalyzer/blob/dev/pcap_formatted.py for your own cybersecurity projects and start analyzing PCAP files smarter and faster!]]></description>
		<content:encoded><![CDATA[<p>Automated Network Packet Analysis with Gemini AI and Scapy<br />
<a href="https://medium.com/the-last/automated-network-packet-analysis-with-gemini-ai-and-scapy-d049763d40b3" rel="nofollow">https://medium.com/the-last/automated-network-packet-analysis-with-gemini-ai-and-scapy-d049763d40b3</a></p>
<p>This project was developed as part of a graduate course at UVU, aiming to address a challenging problem in packet analysis. The assignment involved scanning and analyzing packets within a large PCAP file, with the objective of reviewing each packet and identifying potential vulnerabilities. Given that the file contained over 500 lines, I decided to automate the process by creating a tool to specifically detect HTTP requests like POST, PUT, DELETE, and other significant operations.</p>
<p>This automation enables efficient inspection between packets to identify any activity that warrants attention. When a relevant packet is detected, the tool generates a detailed report containing the following information: source IP, destination IP, protocol, payload size, a brief summary, an explanation of the issue, potential solutions, and recommended actions.</p>
<p>Manual packet analysis can be time-consuming, especially when dealing with large datasets. </p>
<p>This script reads PCAP files, extracts packet details, and uses Google’s Gemini AI to explain packet behavior and suggest security solutions.</p>
<p>Scapy is a powerful library for packet manipulation and analysis. The script reads packets from .pcap files</p>
<p>Using Gemini AI (gemini-pro model), the script generates a human-readable explanation for each packet summary.</p>
<p>The script dynamically asks Gemini AI to suggest potential security fixes or improvements based on the explanation.</p>
<p>The details, explanations, and solutions are formatted into a comprehensive report for each packet.</p>
<p>The script can process all PCAP files in a specified folder and save detailed reports in an output folder.</p>
<p>Why Use This Tool?</p>
<p>    Efficient Analysis: Process multiple PCAP files quickly.<br />
    AI-Powered Insights: Gemini AI helps explain complex packets and generate tailored security recommendations.<br />
    Automated Reporting: Generates organized reports to simplify your workflow.</p>
<p> Final Thoughts</p>
<p>Automating network analysis with AI can save valuable time and enhance your ability to detect and mitigate security issues. This script combines the power of Scapy for packet analysis and Gemini AI to generate insights and solutions.</p>
<p>Ready to give it a try? Clone or adapt this script — <a href="https://github.com/hvaandres/PcapAnalyzer/blob/dev/pcap_formatted.py" rel="nofollow">https://github.com/hvaandres/PcapAnalyzer/blob/dev/pcap_formatted.py</a> for your own cybersecurity projects and start analyzing PCAP files smarter and faster!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/09/23/monitoring-android-traffic-with-wireshark/comment-page-2/#comment-1852775</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 29 Apr 2025 13:44:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27017#comment-1852775</guid>
		<description><![CDATA[Simulate TCP Syn Floods with ChatGPT and Wireshark
https://www.youtube.com/watch?v=WnMW8yN3Etc

This video will cover how to analyze a packet capture in Wireshark for signs of a TCP SYN flood. We&#039;ll start by generating a simple Python script to generate TCP connections, and analyze the traffic as the transaction rate is increased. We will also show you how to graph both good and rejected connections over time.]]></description>
		<content:encoded><![CDATA[<p>Simulate TCP Syn Floods with ChatGPT and Wireshark<br />
<a href="https://www.youtube.com/watch?v=WnMW8yN3Etc" rel="nofollow">https://www.youtube.com/watch?v=WnMW8yN3Etc</a></p>
<p>This video will cover how to analyze a packet capture in Wireshark for signs of a TCP SYN flood. We&#8217;ll start by generating a simple Python script to generate TCP connections, and analyze the traffic as the transaction rate is increased. We will also show you how to graph both good and rejected connections over time.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/09/23/monitoring-android-traffic-with-wireshark/comment-page-2/#comment-1848418</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 13 Mar 2025 22:21:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27017#comment-1848418</guid>
		<description><![CDATA[https://github.com/GyulyVGC/sniffnet]]></description>
		<content:encoded><![CDATA[<p><a href="https://github.com/GyulyVGC/sniffnet" rel="nofollow">https://github.com/GyulyVGC/sniffnet</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/09/23/monitoring-android-traffic-with-wireshark/comment-page-2/#comment-1848417</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 13 Mar 2025 22:21:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27017#comment-1848417</guid>
		<description><![CDATA[https://github.com/faucetsdn/NetworkML]]></description>
		<content:encoded><![CDATA[<p><a href="https://github.com/faucetsdn/NetworkML" rel="nofollow">https://github.com/faucetsdn/NetworkML</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/09/23/monitoring-android-traffic-with-wireshark/comment-page-2/#comment-1848416</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 13 Mar 2025 22:20:24 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27017#comment-1848416</guid>
		<description><![CDATA[https://github.com/nb0309/Network-Traffic-Analysis-using-Machine-learning]]></description>
		<content:encoded><![CDATA[<p><a href="https://github.com/nb0309/Network-Traffic-Analysis-using-Machine-learning" rel="nofollow">https://github.com/nb0309/Network-Traffic-Analysis-using-Machine-learning</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
