<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Packet capture for specific ip like signature match in Automation/API Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/packet-capture-for-specific-ip-like-signature-match/m-p/10675#M297</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I haven't tried this myself yet, but you might be able to do it based on the following article, if you have a seperate rule for the sinkhole traffic: &lt;A href="https://live.paloaltonetworks.com/docs/DOC-3601"&gt;How to Capture Traffic (PCAP) Hitting a Specific Rule&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit: On 2nd thought, in the Anti-Spyware Profile -&amp;gt; DNS Signatures -&amp;gt; where you configure the action as 'sinkhole' there is an option to configure an extended pcap - does this not work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roland&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 08 Apr 2015 12:31:27 GMT</pubDate>
    <dc:creator>eschenburg</dc:creator>
    <dc:date>2015-04-08T12:31:27Z</dc:date>
    <item>
      <title>Packet capture for specific ip like signature match</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/packet-capture-for-specific-ip-like-signature-match/m-p/10674#M296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured DNS sinkhole feature. The sinkholing is working fine with providing and blocking fake ip. The only problem is that although I can get the original client ip connecting to the fake ip, I cannot find the payload (url/resource being requested). Is there any way I can capture packets like spyware/vulnerability etc? I checked into these objects however did not find an option of matching on destination ip address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Apr 2015 14:11:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/packet-capture-for-specific-ip-like-signature-match/m-p/10674#M296</guid>
      <dc:creator>Sly_Cooper</dc:creator>
      <dc:date>2015-04-01T14:11:57Z</dc:date>
    </item>
    <item>
      <title>Re: Packet capture for specific ip like signature match</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/packet-capture-for-specific-ip-like-signature-match/m-p/10675#M297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I haven't tried this myself yet, but you might be able to do it based on the following article, if you have a seperate rule for the sinkhole traffic: &lt;A href="https://live.paloaltonetworks.com/docs/DOC-3601"&gt;How to Capture Traffic (PCAP) Hitting a Specific Rule&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit: On 2nd thought, in the Anti-Spyware Profile -&amp;gt; DNS Signatures -&amp;gt; where you configure the action as 'sinkhole' there is an option to configure an extended pcap - does this not work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roland&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Apr 2015 12:31:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/packet-capture-for-specific-ip-like-signature-match/m-p/10675#M297</guid>
      <dc:creator>eschenburg</dc:creator>
      <dc:date>2015-04-08T12:31:27Z</dc:date>
    </item>
    <item>
      <title>Re: Packet capture for specific ip like signature match</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/packet-capture-for-specific-ip-like-signature-match/m-p/10676#M298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Sly_Cooper,&lt;/P&gt;&lt;P&gt;Since most people set up a fictious IP address as their sinkhole IP address, there is no host on the other end. Any tcp traffic would not make it past the initial syn requests. In order to capture some traffic, the destination host would have to be listening on the applicable port and get past the three way handshake.&amp;nbsp; The data folowing that would be what you are looking for. A sinkhole is just a destination for traffic to go to, it's main benefit is identify infected hosts based on seeing the traffic attempts to the destination IP address of the sinkhole.&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;Phil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Apr 2015 00:13:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/packet-capture-for-specific-ip-like-signature-match/m-p/10676#M298</guid>
      <dc:creator>HITSSEC</dc:creator>
      <dc:date>2015-04-20T00:13:40Z</dc:date>
    </item>
  </channel>
</rss>

