Common lab workflows
1) One-click packet capture (PCAP)
- Place the implant between a test workstation and a lab switch; start capture to storage.
- Filter for protocols of interest (DHCP, mDNS/SSDP, SMB, HTTP, TLS handshakes) for asset discovery and UX testing.
2) Quick recon & inventory
- Leverage built-in discovery scripts to enumerate hosts, open ports, and broadcast services in a test VLAN.
- Export summaries or CSVs for documentation and blue-team runbooks.
3) Controlled MITM lab
- In an isolated environment, demonstrate how bad TLS/cert validation or legacy protocols can be abused.
- Use this to train teams to spot warnings and enforce policy (HSTS, certificate pinning, SMB signing).
4) Out-of-band management / payload staging
- Use a separate management interface or Wi-Fi control (where supported) to manage the implant.
- Keep payloads benign and reversible; aim for awareness training, not disruption.
5) Time-boxed monitoring
- Capture during a defined window to baseline normal traffic in a lab, then compare after policy changes.
Ethics: Do not intercept, modify, or exfiltrate real production traffic. Keep demonstrations inside a lab VLAN or explicit engagement scope.
FAQ
Is a packet capture legal on my network?
Only with explicit authorization and in line with policy. In shared environments, assume traffic is sensitive—use lab VLANs and synthetic data.
Do these devices bypass TLS?
Not by default. In a controlled lab you can demonstrate failures in certificate validation or legacy protocols, but production traffic must remain protected.
Are these the same as SDRs?
No—these operate at the Ethernet layer (wired), not RF. They complement your wireless tooling.