Infoblox’s global team of threat hunters uncovers a DNS operation with the ability to bypass traditional security measures and control the Great Firewall of China. Read about “Muddling Meerkat” and the many other threat actors discovered by Infoblox Threat Intel here.

Best Practices

ThinkstockPhotos-122432442.jpg

WAPI example of Traffic Capture Download

The attached script is an example of using the WAPI to trigger a traffic capture and then download it. It written in Perl, but used the WAPI and not the PAPI. Rename traffic_capture_to_file.txt to traffic_capture_to_file.pl.

 

 

To get help use:

 

traffic_capture_to_file.pl --help

traffic_capture_to_file.pl --man

 

Help information also attached in HTML format.

 

Hope that helps someone,

 

Jim

Showing results for 
Search instead for 
Did you mean: