This toolkit provides comprehensive monitoring, analysis, and blocking capabilities for network telemetry sent by The Foundry's Nuke compositor on Linux. Key features: - Network monitoring scripts with automated alerts - Multi-tier blocking methods (hosts, firewall, namespace, AppArmor) - Detailed packet capture analysis and documentation - EULA legal analysis and privacy assessment - Sanitized example captures and comprehensive guides All sensitive data (personal IPs, usernames, packet captures) removed. Ready for public sharing on Gitea.
23 lines
1.1 KiB
Markdown
23 lines
1.1 KiB
Markdown
1. Startup Capture:
|
|
```
|
|
┌─obsidian-vault/2-projects/Nuke-monitoring/dump/02
|
|
└─➜ tshark -r startup.pcap -q -z io,stat,0
|
|
tshark: The file "startup.pcap" doesn't exist.
|
|
```
|
|
2. Local database check:
|
|
```
|
|
|
|
┌─~
|
|
└─➜ find ~/Documents/nuke ~/.nuke -name "*.db" -ls
|
|
6199816 1240 -rw-r--r-- 1 nicholai nicholai 1269760 Oct 23 18:46 /home/nicholai/.nuke/.sync_8178bafde38a.db
|
|
```
|
|
3. System file access trace:
|
|
```
|
|
┌─obsidian-vault/2-projects/Nuke-monitoring/dump/02
|
|
└─➜ sudo strace -e trace=open,openat -p $(pgrep -f Nuke) 2>&1 | grep -E '/proc|/sys|/etc|registry' | tee nuke_system_access.log
|
|
rg: error parsing flag -E: grep config error: unknown encoding: /proc|/sys|/etc|registry
|
|
┌─obsidian-vault/2-projects/Nuke-monitoring/dump/02
|
|
└─➜ sudo strace -e trace=open,openat -p $(pgrep -f Nuke) 2>&1 | grep '/proc|/sys|/etc|registry' | tee nuke_system_access.log ┌─obsidian-vault/2-projects/Nuke-monitoring/dump/02
|
|
└─➜
|
|
```
|