agent security skill risk: medium
Network Traffic Analysis with TShark
The prompt describes steps to automate PCAP analysis using tshark and pyshark: extract protocol statistics and top talkers, detect suspicious flows, extract IOCs, analyze DNS traff…
SKILL 4 files · 2 folders
SKILL.md
--- name: performing-network-traffic-analysis-with-tshark description: "Automate network traffic analysis using tshark and pyshark for protocol statistics, suspicious flow detection," --- # Performing Network Traffic Analysis with TShark ## Overview This skill automates packet capture analysis using tshark (Wireshark CLI) and pyshark (Python wrapper). It extracts protocol distribution statistics, identifies suspicious network flows (port scans, beaconing, data exfiltration), extracts IOCs (IPs, domains, URLs), and detects DNS tunneling patterns from PCAP files. ## When to Use - When conducting security assessments that involve performing network traffic analysis with tshark - When following incident response procedures for related security events - When performing scheduled security testing or auditing activities - When validating security controls through hands-on testing ## Prerequisites - tshark (Wireshark CLI) installed and in PATH - Python 3.8+ with pyshark library - PCAP or PCAPNG capture file for analysis ## Steps 1. **Extract Protocol Statistics** — Generate protocol hierarchy and conversation statistics from the capture 2. **Identify Top Talkers** — Rank source/destination IPs by volume and connection count 3. **Detect Suspicious Flows** — Flag port scanning patterns, unusual port usage, and high-frequency connections 4. **Extract Network IOCs** — Pull unique IPs, domains from DNS queries, and URLs from HTTP traffic 5. **Analyze DNS Traffic** — Detect DNS tunneling via high-entropy subdomain queries and excessive TXT records 6. **Generate Analysis Report** — Produce structured report with flow summaries and threat indicators ## Expected Output - JSON report with protocol statistics and top talkers - Suspicious flow detections with severity ratings - Extracted IOCs (IPs, domains, URLs) - DNS anomaly analysis results
REQUIRED CONTEXT
- PCAP or PCAPNG capture file
OPTIONAL CONTEXT
- tshark installed in PATH
- Python 3.8+ with pyshark
TOOLS REQUIRED
- tshark
- pyshark
EXPECTED OUTPUT
- Format
- structured_report
- Schema
- bullet_list · JSON report with protocol statistics and top talkers, Suspicious flow detections with severity ratings, Extracted IOCs (IPs, domains, URLs), DNS anomaly analysis results
- Constraints
- JSON report with protocol statistics and top talkers
- suspicious flow detections with severity ratings
- extracted IOCs (IPs, domains, URLs)
- DNS anomaly analysis results
SUCCESS CRITERIA
- Extract Protocol Statistics
- Identify Top Talkers
- Detect Suspicious Flows
- Extract Network IOCs
- Analyze DNS Traffic
- Generate Analysis Report
CAVEATS
- Dependencies
- tshark (Wireshark CLI) installed and in PATH
- Python 3.8+ with pyshark library
- PCAP or PCAPNG capture file for analysis
- Missing context
- Exact tshark or pyshark commands or code for each step
- Precise JSON schema or structure for the report
- Ambiguities
- The description field is truncated after 'suspicious flow detection,'
QUALITY
- OVERALL
- 0.65
- CLARITY
- 0.75
- SPECIFICITY
- 0.55
- REUSABILITY
- 0.65
- COMPLETENESS
- 0.70
IMPROVEMENT SUGGESTIONS
- Complete the truncated description sentence
- Add concrete command examples or pseudocode under each step
USAGE
Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.
MORE FOR AGENT
- MoltPass Client for AI Agent Identitiesagentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Threat Modeling Security Expertagentsecurity
- Security Bluebook Policy Builderagentsecurity
- Security Bluebook Policy Builderagentsecurity
- Security Blue Book Policy Builderagentsecurity
- Threat Modeling Security Architecture Expertagentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Threat Modeling Security Expertagentsecurity
- SIEM Detection Rule Tuning Guideagentsecurity
- AI File Metadata Compliance Auditoragentsecurity
- Azure Storage Misconfiguration Audit Reporteragentsecurity
- Implementing PAM for Database Accessagentsecurity
- AFL++ Coverage-Guided Fuzzing Procedureagentsecurity
- Supply Chain Attack Simulation Detectoragentsecurity
- Security Audit Fix Verifieragentsecurity
- Active Directory ACL Abuse Analyzeragentsecurity
- Privileged Access Workstation Implementation Guideagentsecurity
- SSRF Vulnerability Testing and Reporting Guideagentsecurity
- Security Audit Fix Revieweragentsecurity
- AWS IAM Privilege Escalation Detectoragentsecurity
- SSL/TLS Security Assessment with Sslyzeagentsecurity
- GCP Penetration Testing with GCPBucketBruteagentsecurity
- AWS CloudTrail Anomaly Detection Guideagentsecurity