NSM Console (Network Security Monitoring Console) is a framework for performing analysis on packat capture files. It implements a modular structure to allow for an analyst to quickly write modules of their own without any programming language experience. Using these modules a large amount of pcap analysis can be performed quickly using a set of global (as well as per-module) options.
NSM Console also aims to be simple to run and easy to understand without lots
of learning time.
It is highly recommended that you visit the wiki page, as it stays up to date better.
You can watch a screencast of nsm-console at this post.
You can watch another screencast on how to create a module for NSM-Console here.
The latest version of nsm-console can be downloaded from:
You can see all the posts tagged with the ‘nsm-console’ category tag here.
If you want more information about what it is (and what it does), check out this introductory post.
A list of projected and completed modules is in this post.
NSM-Console changes pretty quickly, since I’m the only developer. I will try to keep a log of what I have added here. NSM console is released as an included tool in the Hex 1.0.3 release, the included version is 0.6-DEVEL.
If you want to check out the code from svn, use the following: