Fast Queries and automated PCAP Workflows
By Anantha Srinivasan, Senior Software Manager, Endace and Sundarram Paravastu, Principal Software Engineer, Endace
In the fast-paced environment of Security Operations Centers (SOCs), swift incident response and threat hunting are essential to combat sophisticated cyber threats. Slow queries, siloed workflows, and manual PCAP retrieval significantly hinder SOC operations, delaying investigations and prolonging detection and remediation times. These inefficiencies, compounded by limited integration and automation, exacerbate analyst fatigue and increase the risk of overlooking critical threats.
At the Black Hat US 2025 NOC, several key innovations were developed and enhanced with Endace and the integrations we have with Cisco, Palo Alto Networks and Corelight. Read: Endace Always-on Packet Capture for additional details.
The innovations developed at Black Hat facilitated the use of Endace’s always-on packet data in incident response and threat hunting workflows, empowering analysts to leverage deep forensic insights more quickly and intuitively during investigations.
Meta-data, flow data or partial packet capture can be useful in detecting possible threats and enabling analysts to get an overview of threat activity. But it often doesn’t contain enough detail for analysts to be certain about exactly what happened.
Always-on packet capture ensures analysts have a complete record of all network activity, giving them access to definitive evidence for threat investigations. Not only can they investigate specific events, but they can also look at what else happened before, after or during the specific event they are looking into.
This lets analysts build a complete picture of threat activity that is otherwise difficult or impossible without access to complete packet evidence. With detailed forensic evidence at their fingertips, they can make better decisions more quickly, speeding investigations and enabling more effective threat response.
Fast Queries: The key to swift threat hypothesis validation
At the Black Hat US 2025 NOC, analysts used EndaceVision to rapidly validate their working hypotheses. One of the key enablers was the ability to expand query time ranges from just a few minutes to the entire conference duration (several days), without compromising on search response times. Despite the broader query window, query response times remained consistently low, allowing analysts to search through all the captured data interactively.
Analysts began their investigations by pivoting into EndaceVision™ via one of the several Endace integrations – e.g. Cisco XDR, Palo Alto Networks XSIAM (newly developed at Black Hat), Splunk etc. – and querying around the incident to analyze the incident activity. As their hypotheses evolved, analysts seamlessly expanded their search window to cover several hours, and eventually the entirety of the captured data. With the ability to filter across multiple dimensions such as IP addresses, conversations, ports, applications, protocols, etc., analysts were able to rapidly identify patterns and anomalies.
Collaboration between NOC analysts is imperative to validate hypothesis or dispense false positives. Having rapid search capabilities integrated into and across the different tool sets being using in the NOC really accelerated investigation theory sharing and investigation workflows. Rapid search into network evidence delivers contextual validation with full packet data captured before, during and after threat indicators. Having a platform that can support a large number of users with fast query times across extended look back times is a game changer for next generation NOC/SOC teams.
Total queries |
2900 |
Median query duration |
16 hours |
Max query duration |
1 week |
Average query response time |
1.5 seconds |
Active analysts |
20+ |
Top Filter dimensions |
IPs, Conversations, Ports, Protocol, Application, MAC, client / server |
Average PCAP download time |
30s |
Total PCAP downloaded |
53GB |
Average PCAP download size |
40MB |
Automating PCAP Workflows for Faster Investigations
For Black Hat US 2025, Endace implemented an API that enabled integrations to extract relevant packet data (PCAP) and associated metadata, such as IP conversations, in CSV format for every incident, automatically. Matt Vander Horst (Cisco) helped integrate this capability into Cisco XDR’s workflow automation. For each incident tracked in Cisco XDR, the system automatically triggers an API request to Endace InvestigationManager™ to extract and save the relevant PCAP and flow metadata. Links to the saved PCAP and metadata are embedded into the incident worklog for easy access. This ensured forensic data was readily available and contextually linked to the incident, eliminating the need for manual retrieval or delayed access.
SOC analysts used this capability to reduce investigation time. Instead of waiting to extract packets manually, they could immediately pivot to the saved PCAP and metadata as soon as they began reviewing an incident. This not only accelerated root cause analysis but also reduced cognitive load and fatigue, allowing analysts to focus on threat validation and response with full context.
More than 250 incidents leveraged this automation to extract and link relevant packet data, saving precious analyst time and improving overall workflow efficiency.
This integration also supported on-demand extraction of pcap and flow metadata CSV artifacts, based on observables on the incident.
Endace InvestigationManager extracts and saves relevant PCAP for the Cisco XDR incident.

The Cisco XDR worklog enrichment added links to the EndaceVision investigation, the associated PCAP, and the CSV metadata associated with the incident, to make it easy for analysts to pivot directly to the detailed forensic evidence directly from the incident worklog.

Acknowledgements
Our thanks to the Black Hat NOC team, led by Grifter, Bart, and Fink, for the opportunity to include EndaceProbes in the Black Hat NOC architecture. Also, a special thank you to Jessica Bair Oppenheimer for including Endace in the Cisco security stack architecture for Black Hat, sharing the Cisco screens and space in the NOC.
Thanks also to Matt Vander Horst at Cisco for building the XDR integration with the Endace vault API and Aditya Sankar at Cisco for setting up automation remote access.
About Black Hat
Black Hat is the cybersecurity industry’s most established and in-depth security event series. Founded in 1997, these annual, multi-day events provide attendees with the latest in cybersecurity research, development, and trends. Driven by the needs of the community, Black Hat events showcase content directly from the community through Briefings presentations, Trainings courses, Summits, and more. As the event series where all career levels and academic disciplines convene to collaborate, network, and discuss the cybersecurity topics that matter most to them, attendees can find Black Hat events in the United States, Canada, Europe, Middle East and Africa, and Asia. For more information, please visit www.blackhat.com.
For more blogs in our Endace SOC series, see here:
https://blog.endace.com/tag/soc/