{"id":6,"date":"2024-11-22T00:54:47","date_gmt":"2024-11-22T08:54:47","guid":{"rendered":"https:\/\/www.kenwebster.com\/?p=6"},"modified":"2025-07-09T10:12:27","modified_gmt":"2025-07-09T17:12:27","slug":"muonfp-open-source-project","status":"publish","type":"post","link":"https:\/\/www.kenwebster.com\/index.php\/2024\/11\/22\/muonfp-open-source-project\/","title":{"rendered":"MuonFP open source project"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">During a recent project involving listening research for cyber security, I came across the need to build a utility that could &#8216;fingerprint&#8217; TCP connections for analysis. My use case was specifically around honeypots and making those &#8216;listening&#8217; sensors, so I needed something realtime, no dependencies and light-weight. Many of the tools out there are written in C, hard to maintain and have alot of dependencies in order to read the packets and process.<br><br>I wrote my own using RUST and it involves it&#8217;s own network tap using the pnet crate and logs the fingerprint as well as the pcaps. If you don&#8217;t need the pcap, you can send them to \/dev\/null.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Here is the repo:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/github.com\/sundruid\/muonfp\">https:\/\/github.com\/sundruid\/muonfp<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<a href=\"https:\/\/www.kenwebster.com\/index.php\/2024\/11\/22\/muonfp-open-source-project\/\" rel=\"bookmark\" title=\"Permalink to MuonFP open source project\"><p>During a recent project involving listening research for cyber security, I came across the need to build a utility that could &#8216;fingerprint&#8217; TCP connections for analysis. My use case was specifically around honeypots and making those &#8216;listening&#8217; sensors, so I needed something realtime, no dependencies and light-weight. Many of the tools out there are written [&hellip;]<\/p>\n<\/a>","protected":false},"author":1,"featured_media":7,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2],"tags":[],"class_list":["post-6","post","type-post","status-publish","format-standard","has-post-thumbnail","category-cyber-security","h-entry","hentry"],"_links":{"self":[{"href":"https:\/\/www.kenwebster.com\/index.php\/wp-json\/wp\/v2\/posts\/6","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kenwebster.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kenwebster.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kenwebster.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kenwebster.com\/index.php\/wp-json\/wp\/v2\/comments?post=6"}],"version-history":[{"count":2,"href":"https:\/\/www.kenwebster.com\/index.php\/wp-json\/wp\/v2\/posts\/6\/revisions"}],"predecessor-version":[{"id":16,"href":"https:\/\/www.kenwebster.com\/index.php\/wp-json\/wp\/v2\/posts\/6\/revisions\/16"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kenwebster.com\/index.php\/wp-json\/wp\/v2\/media\/7"}],"wp:attachment":[{"href":"https:\/\/www.kenwebster.com\/index.php\/wp-json\/wp\/v2\/media?parent=6"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kenwebster.com\/index.php\/wp-json\/wp\/v2\/categories?post=6"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kenwebster.com\/index.php\/wp-json\/wp\/v2\/tags?post=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}