• 0 Posts
  • 5 Comments
Joined 5 months ago
cake
Cake day: January 25th, 2024

help-circle

  • halcyon@slrpnk.nettoAsklemmy@lemmy.ml*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    8
    ·
    4 months ago

    It should be clarified that using Wireshark on the hardware in question is still subject to what the operating system is allowing your security context to see - meaning a rootkit or hardware level compromise could hide its traffic in that case.

    Intercepting all traffic coming from the machine using another network node is a good idea though. Wireshark or an IDS like Snort would both work for that.