block-nuke-telemetry/dump/example_capture.pcap.txt
Nicholai 6fada7889a Initial public release - Nuke telemetry monitoring toolkit
This toolkit provides comprehensive monitoring, analysis, and blocking capabilities
for network telemetry sent by The Foundry's Nuke compositor on Linux.

Key features:
- Network monitoring scripts with automated alerts
- Multi-tier blocking methods (hosts, firewall, namespace, AppArmor)
- Detailed packet capture analysis and documentation
- EULA legal analysis and privacy assessment
- Sanitized example captures and comprehensive guides

All sensitive data (personal IPs, usernames, packet captures) removed.
Ready for public sharing on Gitea.
2025-11-26 15:28:21 -07:00

38 lines
975 B
Plaintext

# Example Packet Capture Placeholder
This is a text placeholder representing where actual `.pcap` files would be stored.
## Real Capture Command
```bash
sudo tcpdump -i any -w dump/nuke_foundry_capture.pcap \
'host sentry.foundry.com or host learn.foundry.com or host api.honeycomb.io'
```
## Expected Contents
A real packet capture would contain:
- Ethernet/IP/TCP headers
- DNS queries for Foundry domains
- HTTP requests to learn.foundry.com (unencrypted)
- HTTPS handshakes and encrypted payloads to api.honeycomb.io and sentry.foundry.com
- Timing and packet size information
## Analysis Tools
```bash
# View packet summary
tcpdump -r dump/nuke_foundry_capture.pcap
# Extract HTTP requests
tcpdump -r dump/nuke_foundry_capture.pcap -A 'tcp port 80'
# Wireshark analysis
wireshark dump/nuke_foundry_capture.pcap
```
## Privacy Note
Actual `.pcap` files are NOT included in this repository for privacy reasons.
They are automatically ignored by `.gitignore`.