Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

An Open-Source Tool to See Through Encrypted Traffic in Linux systems

Posted on June 10, 2025June 10, 2025 By CWS

Qpoint has launched Qtap, an open-source eBPF agent for monitoring community visitors in Linux techniques. It hooks into TLS/SSL features to seize knowledge earlier than and after encryption, displaying unencrypted visitors with particulars like course of, container, host, person, and protocol.

Qtap runs out-of-band with low overhead, including no latency or disrupting apps.

Qtap makes it simple to see what’s occurring in your community, particularly for complicated apps, third-party companies, or legacy techniques. It’s light-weight, safe, and works with out invasive setup.

What Qtap Does

Qtap empowers builders, safety professionals, and system directors to achieve deep insights into egress visitors with out modifying functions, putting in proxies, or managing certificates. Whether or not you’re auditing delicate knowledge, debugging community points, or exploring legacy techniques, Qtap gives a transparent view of what’s occurring in your community.

Key Options and Use Circumstances

Qtap’s versatility makes it a foundational part for observability pipelines and customized options like Qpoint. Its key use circumstances embody:

Safety Auditing: Confirm that delicate knowledge isn’t being uncovered in community communications.

Community Debugging: Diagnose API errors, misconfigured parameters, or sudden responses with real-time visitors insights.

API Growth: Guarantee functions ship appropriately formatted requests and deal with responses as anticipated.

Third-Occasion Integrations: Verify knowledge exchanges with exterior companies align with documentation.

Studying & Exploration: Research protocol habits by observing reside visitors.

Legacy Techniques: Acquire insights into poorly documented techniques with out supply code entry.

Validation Testing: Verify software adjustments don’t disrupt community communication patterns.

Find out how to Begin

Attempt Qtap in Demo Mode to see visitors in your terminal:

bash

$ curl -s | sudo sh

To put in and run:

bash

# Set up Qtap
$ curl -s | sudo sh

# Run with defaults
$ sudo qtap

Qtap wants Linux kernel 5.10+ with BTF and eBPF enabled (examine /sys/kernel/btf/vmlinux). It requires elevated permissions: sudo on the host or CAP_BPF and privileged mode in Docker.

Growing Qtap

Qtap is on GitHub. Builders can contribute utilizing:

OS: Linux (kernel 5.10+). MacOS customers can use Lima for a Linux VM.

Instruments: Go 1.24+, make, clang 14 (required), clang-tidy (non-obligatory).

bash

Clone and construct:

$ git clone
$ make construct

Widespread make instructions:

construct: Builds eBPF binaries and Go app.

generate: Creates eBPF binaries.

run: Begins a debug occasion.

ci: Runs CI checks.

Qtap is in early growth. APIs might change, and documentation is likely to be incomplete. Suggestions is welcome through GitHub Points or Discussions. Contributors conform to a Contributor License Settlement for open-source and industrial use.

Automate risk response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:Encrypted, Linux, OpenSource, Systems, Tool, Traffic

Post navigation

Previous Post: Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users
Next Post: FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware

Related Posts

Prioritizing Vulnerabilities in a Sea of Alerts Cyber Security News
Researchers Detailed New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse Cyber Security News
Managing Data Subject Access Requests in Compliance Programs Cyber Security News
UK Government Sets Timeline to Replace Passwords With Passkeys Cyber Security News
IBM QRadar Vulnerabilities Let Attackers Access Sensitive Configuration Files Cyber Security News
New ModSecurity WAF Vulnerability Let Attackers Crash the System Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New SmartAttack Steals Sensitive Data From Air-Gapped Systems via Smartwatches
  • TeamFiltration Abused in Entra ID Account Takeover Campaign
  • Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday
  • HashiCorp Nomad Vulnerability Allows Privilege Escalation via ACL Policy Lookup Exploit
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • New SmartAttack Steals Sensitive Data From Air-Gapped Systems via Smartwatches
  • TeamFiltration Abused in Entra ID Account Takeover Campaign
  • Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday
  • HashiCorp Nomad Vulnerability Allows Privilege Escalation via ACL Policy Lookup Exploit
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News