# fakenet-ng > Emulate network services (HTTP, DNS, SMTP, FTP) to intercept and analyze malware traffic dynamically **Category:** [[categories/explore-network-interactions-services|Explore Network Interactions > Services]] | **Tier:** Rich (FOR610) **Docs:** [https://docs.remnux.org/discover-the-tools/explore+network+interactions/services](https://docs.remnux.org/discover-the-tools/explore+network+interactions/services) ## Usage ```bash fakenet fakenet -c custom_config.ini ``` ## Workflows - [[workflows/behavioral-analysis-workflow|Behavioral Analysis]] — Step 2: Network Interception Setup - [[workflows/network-interception-workflow|Network Traffic Interception]] — Step 2: Service Emulation ## Related Tools - [[tools/dnsresolver|dnsresolver.py]] — DNS resolver tool for dynamic analysis with wildcard and tra - [[tools/fakedns|fakedns]] — Fake DNS server that resolves all queries to a specified IP - [[tools/fakemail|fakemail]] — Intercept and examine SMTP email activity with this fake SMT - [[tools/httpd|httpd]] — Simple HTTP server on REMnux for simulating C2 web servers - [[tools/inetsim|INetSim]] — Emulate internet services (HTTP, HTTPS, DNS, FTP, SMTP) for #network #emulation #dynamic-analysis #c2