Author: Gourav Kumar

  • Tracking Multiple Requests Over a Single Connection with eBPF

    Tracking Multiple Requests Over a Single Connection with eBPF

    Why capturing HTTP Traffic is Crucial for Network Security? Capturing HTTP traffic is like having a digital security camera at your network’s entrance, and it’s essential for keeping your network safe. This ‘camera’ helps you monitor who’s accessing your online space, allowing you to detect and prevent potential security threats, such as cyberattacks and unauthorized…

    by

    in
  • Protocol Parsing Guide: From Packets to Structured Data

    Protocol Parsing Guide: From Packets to Structured Data

    In this blog, I’ll walk you through the essential steps and guidance for parsing network protocols. We’ll assume that you’re already running a Layer 4 (L4) proxy to capture packets into a buffer, and you have both the client and destination connection objects readily available. This guide will focus on helping you convert raw network…

    by

    in
  • Docker Containers: Enabling SSL for Secure Databases

    Docker Containers: Enabling SSL for Secure Databases

    Why Enable SSL for Databases? Security is critical for any application, especially when dealing with sensitive data like financial records or user information. Databases such as MongoDB and PostgreSQL communicate over the network, making them vulnerable to interception. SSL (Secure Sockets Layer) encrypts the communication between the client and the database server to prevent data…

    by

    in
  • Managing Go Processes

    Managing Go Processes

    Introduction: The Challenge of Managing Blocking Processes While working on an application that required executing a command to run a blocking program, such as a TCP/HTTP server, I encountered an interesting challenge. I needed a way to stop the application and its child processes when a signal was sent to the main program, such as…

    by

    in