
blog.packet-foo.com
Packet Foo | Analyzing network packets since 2003Analyzing network packets since 2003
http://blog.packet-foo.com/
Analyzing network packets since 2003
http://blog.packet-foo.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Thursday
LOAD TIME
4.8 seconds
16x16
32x32
64x64
PAGES IN
THIS WEBSITE
20
SSL
EXTERNAL LINKS
66
SITE IP
81.209.179.74
LOAD TIME
4.817 sec
SCORE
6.2
Packet Foo | Analyzing network packets since 2003 | blog.packet-foo.com Reviews
https://blog.packet-foo.com
Analyzing network packets since 2003
Challenge | Packet Foo | Analyzing network packets since 2003
https://blog.packet-foo.com/category/cap/challenge
Archive for the ‘Challenge’ category. During Sharkfest 2015 I put up a challenge that was different from the usual challenges offered. The pcap files are a lot bigger, the task to solve less specific, and the answer not a simple “easy to verify” answer. I promised to put up my solution a few months after posting the challenge to this […]. The Network Capture Playbook Part 2 Speed, Duplex and Drops. Trace File Case Files: SMB2 Performance. Sharkfest Europe 2016 Retrospective. My packet analysis toolset.
May | 2015 | Packet Foo | Analyzing network packets since 2003
https://blog.packet-foo.com/2015/05
Archive for May, 2015. Sharkfest 2015 is coming up fast (22 days, 12 hours to go when typing this), and so I spend the morning hours of my Saturday for preparation of materials for my three talks. Since that also involves adding features and fixing bugs in TraceWrangler (which I also need for the large demo part of my […]. The Network Capture Playbook Part 2 Speed, Duplex and Drops. Trace File Case Files: SMB2 Performance. Sharkfest Europe 2016 Retrospective. My packet analysis toolset.
Sanitization/Anonymisation | Packet Foo | Analyzing network packets since 2003
https://blog.packet-foo.com/category/cap/sanitizationanonymisation
Archive for the ‘Sanitization/Anonymisation’ category. Tracewrangler was always supporting IPv6 from the start (even though without extension headers except fragmentation), but last weekend I realized that I could improve the sanitization feature due to something that is missing compared to IPv4: subnet masks. This may sound funny, but in fact the missing subnet masks help. It’s been a while…. PCAP and PCAPng sanitization tool for network analysts. Trace File Case Files: SMB2 Performance. On The Network ...
TCP Analysis | Packet Foo | Analyzing network packets since 2003
https://blog.packet-foo.com/category/cap/tcp-analysis
Archive for the ‘TCP Analysis’ category. Trace File Case Files: SMB2 Performance. During Sharkfest 2015 I put up a challenge that was different from the usual challenges offered. The pcap files are a lot bigger, the task to solve less specific, and the answer not a simple “easy to verify” answer. I promised to put up my solution a few months after posting the challenge to this […]. TCP Analysis and the Five-Tuple. The TCP expert of Wireshark is doing a pretty good job at pinpointing problems, helping ana...
Deep Dive: Frame Timestamps | Packet Foo | Analyzing network packets since 2003
https://blog.packet-foo.com/2015/04/deep-dive-frame-timestamps
Deep Dive: Frame Timestamps. Nevermind. Let’s go. Okay, a capture taken at. For my friends in the US. I know you know. Just sayin’ 😉 ) on the 22nd of March 2014. Opening the exact same file. On another system shows this instead, now with. Let’s do something crazy and look at the capture file in a hex editor. I prefer the “ 010 Editor. As you can see, the timestamp of the first frame is stored as hexadecimal. With the microseconds in a second value being. The first part is stored in seconds since. But wa...
TOTAL PAGES IN THIS WEBSITE
20
C-skills: July 2014
http://c-skills.blogspot.com/2014_07_01_archive.html
Monday, July 7, 2014. Lets have a look on how our traffic is XKey-scored and whether. Its done with efficiency. Seems to be some kind of mangled-C , just like. A lot of C/C -based languages exist for big/parallel. CUDA or other parallelizing extensions). Given that, DB. Is obviously some kind of nested std: map. Apparently of a derived. Type, as can be seen by the apply(). Member which is not part of a STL map. Its probably not a multimap. Either, as denoted. Assignments are not possible. It gets to DB["...
November 2016 – PacketTrain.NET
http://www.packettrain.net/2016/11
Wireshark protocol analysis and troubleshooting. 5-minute troubleshooting. Can you hear me? Here I want to start new article series called “5-minute troubleshooting”. In these articles I’m going to describe short simple cases which we solved very quickly using protocol analysis and which could take much more time if we use another approach. So, let’s go. One day we received an IP camera from our customer with the next complaint: No image, no ping, the camera just disappeared from a network .
PMTUD or not? Part 2. My answers. – PacketTrain.NET
http://www.packettrain.net/2016/10/03/pmtud-or-not-my-answers
Wireshark protocol analysis and troubleshooting. Part 2. My answers. This blog post contains answers to the questions I’ve asked in my PMTUD or not? Article. If you want to work through them yourself, do not read the following. Ok, let’s start. First I want to say that these answers are just my thoughts, and if you don’t agree welcome to have a discussion. Maybe I’ll learn a lot of new things, and this is always great. Standalone question 1. Why the first thing I did was the server side capture? Question...
C-skills: lophttpd fucks the POODLE
http://c-skills.blogspot.com/2014/10/lophttpd-fucks-poodle.html
Thursday, October 30, 2014. Lophttpd fucks the POODLE. Not just because they are ugly but also because lophttpd. Never was affected by POODLE, since SSLv3. Disabled for a reason in favor of TLSv1. I think about dropping. Too and just allowing TLSv1.1. To my knowledge lophttpd. Is also the first webserver. I also added SO REUSEPORT. Support today, since Google. That when handling c10k, their processes. Are un-evenly distributed across the cores (what the hell. Are they doing there? Only happen when the.
C-skills: troubleshooter trickery
http://c-skills.blogspot.com/2015/03/troubleshooter-trickery.html
Wednesday, March 25, 2015. Demo of SELinux disable on a Fedora 21 default desktop. A full writeup can be found here. Subscribe to: Post Comments (Atom). Jeffrey carr on cyberwar. My dear Mr. Esser. A Sun Engineer's blog. Xorl %eax, %eax. Miguel de Icaza's blog. Disclaimer: This is my personal and private weblog. The views expressed on this website/weblog are mine alone and do not necessarily reflect the views of my employer. View my complete profile.
C-skills: December 2014
http://c-skills.blogspot.com/2014_12_01_archive.html
Friday, December 19, 2014. QI for the win. Now that we officially know that 3G can be broken and that. It makes sense to place particular (passive) hardware on the. Roof top of embassies (the cellar is already stuffed with. Torture equipment and you have better gain at the roof),. Here was correct. In particular the. Last paragraph should be repeated, as you can start sending. Before the victim packet is even close to the. Target if you just captured the SYN packet on air. Thursday, December 11, 2014.
C-skills: C++11 bailout trickery
http://c-skills.blogspot.com/2015/04/c11-bailout-trickery.html
Thursday, April 23, 2015. C 11 bailout trickery. Is someone C 11 guru enough to make a statement whether. The following C 11 code is correct? Whats happening on line 24, as the lambda should not. Harvest the memory structures (scope? To me, everything looks OK. If thats the case, it would ease. Cleanup routines on error returns from functions. Please leave a comment. For the arrays s you could instead use:. Unique ptr s[1000];. Std: fstream file{/etc/passwd, ios base: in};. April 23, 2015 at 8:30 AM.
C-skills: May 2015
http://c-skills.blogspot.com/2015_05_01_archive.html
Thursday, May 21, 2015. Now, that the TURMOIL slides make sense. I adjusted my own. Projects. The good news is that I always used to generate. Unique DH params (I wonder so many ppl apparently didnt -. There is no real benefit to use hard coded values, except to Eve! In my projects during or before build. So it should be. Quite hard for a N. Dversary to break that. I removed 512 and 1024 bit DH params. Support and use 2048bit instead. opmsg. 2048bit (and higher), but the default was 1024. So I changed.
C-skills: January 2015
http://c-skills.blogspot.com/2015_01_01_archive.html
Thursday, January 8, 2015. In the last post I promised to stop threat analyzing. So here. Is some dev again which I already started developing back. In 2014 and where I finally found some time to finish. Its a small U2F stack. With the APDU framing code based. On Googles U2F reference code. After reviewing a lot of other. I found this reference code comprehensive enough to. Be usable for myself and for PAM code. It also builds on Darwin, but I didnt have time to test it. Subscribe to: Posts (Atom).
TOTAL LINKS TO THIS WEBSITE
66
Packers Movers Indore
Tuesday, 3 January 2017. Move To Indore Easily With Packers And Movers Indore. Who do all the extreme work of yours in the interest of you that prompts to a safe and peaceful migration. Best Movers And Packers Indore. Indore is a city with high thickness and moving on such populated city is intense so moving with a specialist will prompt to a protected #move. You can employ Packers and Movers Indore. They likewise give you quality affirmation as they will utilize brilliant bundling material to pack your ...
blog.packersmoversmumbaicity.in
Packers Movers Mumbai
Wednesday, January 11, 2017. A Radical New Point Of View Of Moving Stuff-Packers And Movers Mumbai. For all sort of moving arrangement. Movers And Packers Mumbai. You can get to our site Packers and Movers Mumbai. For finish #office #moving work and additionally for #home #moving work, even we likewise bargains in the incomplete moving of a particular sort of stuff. Packers and Movers Mumbai. Packers And Movers Mumbai. Monday, January 9, 2017. You've Gone To The Correct Place! Any Client Has A Couple Of ...
Packers Movers Patna
Thursday, 12 January 2017. Moving From Patna To Another Where With Best Packers And Movers Patna. Packers And Movers Patna Offers Broad Scope Of Administrations. Packers and Movers Patna. Has been in the business for long and has picked up the trust of a great many clients. On the off chance that you are in directness and needs to migrate on quick premise then additionally packers and movers will help you in the whole procedure they will offer palatable administrations. Movers and packers in Patna. We co...
Packers Movers Pune
Top Best Good √√√ Packers And √√√ Movers Pune, √√√ Local Household Shifting √√√ Relocation √√√ Household at PackersMoversPune.org. Monday, 9 January 2017. Contract Just Expert Packer And Mover Pune. Pressing and Moving Is An Expert Undertaking Let The Expert Do It. Packers and Movers Pune. Why ought to enlist just expert packer and mover? As said that lone experts are well to do, here are a portion of the reasons that why you ought to contract just expert Packers and Movers in Pune. They have sufficient ...
Packer Thomas Blog | Your Substantiated Leader in Accounting, Tax, Audit, Business Consulting & Beyond
Your Substantiated Leader in Accounting, Tax, Audit, Business Consulting and Beyond. Oil & Gas. Wine of the Month. Risk Management in a Mobile World. How do these mobile devices expose our company? Consider the two key reasons why IT needs to adopt new strategies for securing corporate data on mobile, as compared to PCs, when pursuing a strategy to heighten user productivity.… Read more. This entry was posted in Technology Issues. September 18, 2014. My 2%’s Worth. Any time I review an estate or trust in...
Packet Foo | Analyzing network packets since 2003
Frame bytes vs. frame file headers. When capturing frames from a network there is more information recorded into the capture file than just the bytes of each frame. If you have ever looked at the PCAP or PCAPng file format specifications you have seen that each frame has an additional frame header containing important information that wasn’t part of the frame itself. 8220;Jasper, do you have a minute? I think that is the one sentence that I heard most at Sharkfest 2015. Was always supporting IPv6 from th...
Net = Packet Header != Security ? 0 : 1
Net = Packet Header! This blog contains information security, penetration testing, and network architecture materials. Tuesday, March 1, 2016. How to create a SOHO router using Ubuntu Linux. NOTE: Supporting configuration files associated with this blog post can be found at. Https:/ bitbucket.org/jsthyer/soho router. Http:/ soekris.com/products/net6501-1.html. Or the Netgate RCC-VE 2440 (. Http:/ store.netgate.com/ADI/RCC-VE-2440.aspx. Now we need to establish what the internal / inside interfaces of our...
Increase your Packet IQ! – Analysis – Splunk – Machine Learning – IoT – Robotics
Increase your Packet IQ! Analysis - Splunk - Machine Learning - IoT - Robotics. Nov 2017: My blog is under new construction…. November 2, 2017. Guest Blog at GarlandTechnology.com: The Hype Surrounding SDN. January 22, 2015. Sometimes it IS the network: Bandwidth Analysis. August 9, 2014. Review of the Datacom Systems SINGLEstream SS-1204BT/BT-S Link Aggregating TAP. August 1, 2014. The need for Wireshark skills is universal across IT. June 9, 2014. November 2, 2017. November 2, 2017. January 22, 2015.
Packetloop Blog
Packetloop acquired by Arbor Networks. Packetloop acquired by Arbor Networks. Tuesday, September 03, 2013. Today we are thrilled to announce that Packetloop has agreed to become part of Arbor Networks. On this journey we spoke to a lot of different people and got plenty of feedback from different organizations. Everyone had a view on what we were doing, how we could do it better, whom we should partner with and what was missing from the platform. Did we want to revolutionize the security analytics market?
packetqueue.net — Musings on computer stuff, and things… and other stuff.
Skip to primary navigation. Skip to primary sidebar. Somewhat Recent) Publication List. Musings on computer stuff, and things. and other stuff. October 23, 2017. We Broke I.T. Purchasing. What is the difference between unethical and ethical advertising? Unethical advertising uses falsehoods to deceive the public; ethical advertising uses truth to deceive the public. Vilhjalmur Stefansson. The process by which we in the IT. Charts are very important here, vendor sales people equally so, and analysts are p...
PackeTsar Blog - Just another engineering blog
July 11, 2016. TinyXMLtoDict (TXD) is a skinny XML to Python dictionary converter which works in Python2 or Python3 and requires no non-native libraries/modules. It was built to do XML conversions for simple data structures (like REST calls)…. June 10, 2016. Troubleshooting and managing a network is much easier when you have the proper tools. Anybody who has been in the IT world for a time likely has a stash of small, portable, and often free…. May 19, 2016. RadiUID: Palo Alto User-ID and RADIUS. October...
SOCIAL ENGAGEMENT