.. _getting_started: ====================================================== 1. Getting started with PacketQC ====================================================== This section covers all you need to know about PacketQC before you starting using it. ----------------------- 1.1. Before you start ----------------------- * Ensure that you have access to a browser and have the latest version of Google Chrome, Mozilla Firefox or Microsoft Edge. * Ensure that you have at least one pcap file to use in the tool. The following formats have been tested and are supported: - .pcap - .pcapng - .cap * To capture a pcap file, we recommend you use either tcpdump or Wireshark. * Make sure to enter the correct website: https://packetqc.pqcee.com. -------------------------- 1.2. PacketQC's features -------------------------- PacketQC has several features: 1. Ability to get general network security posture from the dashboard. 2. Ability to filter connections by protocol and / or port. 3. Ability to sort connections by column. 4. Ability to classify security of individual interactions, as well as protocol and port combinations. 5. Analysis of common security protocols, including showing common attributes for each connection like timestamp and source IP address, and providing a detailed view as a dropdown for all the analyzed cryptographic protocols. 6. Ability to download security report in .json format. (Currently under development) PacketQC is currently able to analyze the following cryptographic protocols (which cover the bulk of all encrypted traffic on the internet) for quantum and classical security: * TLS (Transport Layer Security) * QUIC (Quick UDP Internet Connections) * IPsec (Internet Protocol security) * SSH (Secure Shell) * RDP (Remote Desktop Protocol) In addition to this, PacketQC is show whether individual algorithms are quantum secure (protected against quantum computing attacks), classically secure (protected against classical computing attacks) or insecure (not protected against both). PacketQC is also able to scan and show all other non-crypto connections as well, although these connections are left unclassified.