﻿<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">
<channel>
<title><![CDATA[蚂蚁网-多维人生，三实而立！]]></title> 
<description><![CDATA[真实-不弄虚，不做假，做自己，不违心；
踏实-不浮躁，不盲从，不急功，不近利；
实学-不投机，不取巧，勤于学，精于业。]]></description>
<link>http://www.vants.org/</link>
<language>zh-cn</language>
<generator>www.emlog.net</generator>
<item>
	<title>SharkFest'20 Virtual Retrospective</title>
	<link>http://www.vants.org/?post=301</link>
	<description><![CDATA[<h3 class="post-title2" style="box-sizing:border-box;font-family:sans-serif;font-weight:100;line-height:1.1;color:rgba(0, 0, 0, 0.8);margin-top:20px;margin-bottom:10px;font-size:24px;background-color:rgba(255, 255, 255, 0.7);padding:5px 5px 5px 0px;text-transform:uppercase;letter-spacing:2px;"><span style="box-sizing:border-box;font-weight:700;font-size:14px;">THURSDAY SESSIONS</span></h3>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:10px;list-style:none;color:#333333;font-family:Oswald, &quot;Helvetica Neue&quot;, Helvetica, Arial, sans-serif;font-size:20px;letter-spacing:2px;"><li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">01:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/01.zip" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">BACNet and Wireshark for Beginners</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">by Werner Fischer</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/QxCMxXjqkyA" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">02:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/02.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Going down the retransmission hole</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">by Sake Blok</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/YupQjxPyuUQ" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">03: IPv6 security assessment tools (aka IPv6 hacking tools) by Graham Bloice</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/yNoBIpWt-v8" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">04: Improving packet capture in the DPDK by Stephen Hemminger</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/YhYZ-fGTa_s" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">05:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/05.pptx" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Kismet and Wireless Security 101</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">by Mike Kershaw</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/z6MzIDwjUmc" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">06: Packets! Wait... What? A very improvised last-minute Wireshark talk about things you can find in pcap files that are funny, interesting or weird. I don't know. Let's find out together by Jasper Bongertz</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/S7OsIOrvCKw" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">07: TLS encryption and decryption: What every IT engineer should know about TLS by Ross Bagurdes</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/9cAyDAbMtZY" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">08: Why an Enterprise Visibility Platform is critical for effective Packet Analysis? by Keval Shah</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/cFGC13xUvKg" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">09:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/09.zip" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Troubleshooting Cloud Network Outages by</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">Chris Hull</span></li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">10:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/10.zip" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">TCP SACK overview &amp; impact on performance (subject to change)</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">by John Pittle</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/4wEDcBZb7fU" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">11:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/11.zip" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Automation TIPS &amp; tricks Using Wireshark/tshark in Windows</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">by Megumi Takeshita</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/kv97gYCMM5Q" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">12:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/12.pptx" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">How Long is a Packet? And Does it Really Matter?</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">by Stephen Donnelly</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://www.youtube.com/watch?v=1fU8lvr1Zds" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
</ul>
<h3 class="post-title2" style="box-sizing:border-box;font-family:sans-serif;font-weight:100;line-height:1.1;color:rgba(0, 0, 0, 0.8);margin-top:20px;margin-bottom:10px;font-size:24px;background-color:rgba(255, 255, 255, 0.7);padding:5px 5px 5px 0px;text-transform:uppercase;letter-spacing:2px;"><span style="box-sizing:border-box;font-weight:700;font-size:14px;">FRIDAY SESSIONS</span></h3>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:10px;list-style:none;color:#333333;font-family:Oswald, &quot;Helvetica Neue&quot;, Helvetica, Arial, sans-serif;font-size:20px;letter-spacing:2px;"><li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">13: Make the bytes speak to you by Roland Knall</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/Sc9kDIidrxA" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">14:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/14.zip" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">USB Analysis 101</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">by Tomasz Moń</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/cUljKImph4s" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">15: TLS decryption examples by Peter Wu</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/v-lDEiA7JPE" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">16: The Packet Doctors are in! Packet trace examinations with the experts by Drs. Blok, Greer Landström, Rogers</span></li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">17:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/17.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Analyzing Honeypot Traffic</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">by Tom Peterson</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/aQJW3Kx56sY" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">18: Intrusion Analysis and Threat Hunting with Suricata by Josh Stroschein and Jack Mott</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/0WgyiOxCFzE" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">19: The Other Protocols (used in LTE) by Mark Stout</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/cUljKImph4s" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">20:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/20.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Practical Signature Development for Open Source IDS</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">by Jason Williams and Jack Mott</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/Y9tem2ryrbU" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">21:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/21.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Ostinato - craft packets, generate traffic</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">by Srivats P</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/1DIs2VIT3bI" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">22: Introduction to WAN Optimization by John Pittle</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/IyvlvmdbvZM" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">23: Solving Real World Case Studies by Kary Rogers</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/Iqk9waColDo" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">24: Analyzing 802.11 Powersave Mechanisms with Wireshark by George Cragg</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/IFIuCHQBOfE" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
</ul> <a href="http://www.vants.org/?post=301">阅读全文&gt;&gt;</a><div id="related_log" style="font-size:12px"><p><b>相关日志：</b></p><p><a href="http://www.vants.org/?post=289">某省厅门户网站A市局访问异常应急处置</a></p><p><a href="http://www.vants.org/?post=261">SharkFest'15 Retrospective</a></p><p><a href="http://www.vants.org/?post=300">SharkFest'19 Retrospective</a></p><p><a href="http://www.vants.org/?post=196">【转】中科院《个人隐私泄露风险的技术研究报告V1.0》的部分内容</a></p><p><a href="http://www.vants.org/?post=280">见缝插针-DNS泛解析是怎么被黑客玩坏的</a></p></div>]]></description>
	<pubDate>Thu, 05 Nov 2020 01:57:31 +0000</pubDate>
	<author>易隐者</author>
	<guid>http://www.vants.org/?post=301</guid>

</item>
<item>
	<title>SharkFest'19 Retrospective</title>
	<link>http://www.vants.org/?post=300</link>
	<description><![CDATA[<h3 class="post-title2" style="box-sizing:border-box;font-family:sans-serif;font-weight:100;line-height:1.1;color:rgba(0, 0, 0, 0.8);margin-top:20px;margin-bottom:10px;font-size:24px;background-color:rgba(255, 255, 255, 0.7);padding:5px 5px 5px 0px;text-transform:uppercase;letter-spacing:2px;"><span style="box-sizing:border-box;font-weight:700;font-size:14px;">KEYNOTE PRESENTATIONS</span></h3>
<h4 style="box-sizing:border-box;font-family:sans-serif;font-weight:500;line-height:1.1;margin-top:10px;margin-bottom:10px;font-size:18px;"><span style="box-sizing:border-box;font-weight:700;"><a href="https://sharkfestus.wireshark.org/assets/presentations19/gerald-keynote.pptx" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Latest Wireshark Developments &amp; Road Map</span></a></span><br style="box-sizing:border-box;" />
<span style="font-size:14px;">Gerald Combs</span></h4>
<h3 class="post-title2" style="box-sizing:border-box;font-family:sans-serif;font-weight:100;line-height:1.1;color:rgba(0, 0, 0, 0.8);margin-top:20px;margin-bottom:10px;font-size:24px;background-color:rgba(255, 255, 255, 0.7);padding:5px 5px 5px 0px;text-transform:uppercase;letter-spacing:2px;"><p style="margin-top:10px;margin-bottom:10px;color:#000000;letter-spacing:normal;text-transform:none;box-sizing:border-box;line-height:1.1;font-size:18px;"><span style="font-size:14px;">TUESDAY CLASSES</span></p>
</h3>
<h3 class="post-title2" style="box-sizing:border-box;font-family:sans-serif;font-weight:100;line-height:1.1;color:rgba(0, 0, 0, 0.8);margin-top:20px;margin-bottom:10px;font-size:24px;background-color:rgba(255, 255, 255, 0.7);padding:5px 5px 5px 0px;text-transform:uppercase;letter-spacing:2px;"><ul style="box-sizing:border-box;margin-top:0px;margin-bottom:10px;list-style:none;color:#333333;font-family:Oswald, &quot;Helvetica Neue&quot;, Helvetica, Arial, sans-serif;font-size:14px;text-transform:none;background-color:#ffffff;"><li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">01:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/01.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">War story: troubleshooting issues on encrypted links</a>&nbsp;by Christian Landström</li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">02:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/02-26.pptx" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">TLS encryption &amp; decryption: What every IT engineer should know about TLS</a>&nbsp;by Ross Bagurdes</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=qbPOXoNXtGY" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:22:25)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">03:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/03.zip" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Writing a Wireshark Dissector: 3 ways to eat bytes</a>&nbsp;by Graham Bloice</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=Fp_7g5as1VY" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:18:07)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">04: Solving (SharkFest) packet capture challenges with only tshark by Sake Blok</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=gMg8ttIzry0" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:14:11)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">05:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/05.pptx" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">How long is a packet? And does it really matter?</a>&nbsp;by Stephen Donnelly</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=2GFCzAYSJx0&amp;list=PLz_ZpPUgiXqMeN9ly6-lbr6Gdf3mknGIe&amp;index=8&amp;t=0s" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:17:54)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">06: Creating dissectors like a pro by generating dissectors by Richard Sharpe</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=XFFkC4PdCbI&amp;list=PLz_ZpPUgiXqMeN9ly6-lbr6Gdf3mknGIe&amp;index=9&amp;t=0s" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:20:38)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">07:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/07-23.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">To Send or not to Send? How TCP congestion control algorithms work</a>&nbsp;by Vladimir Gerasimov</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=EO8BaUwQHNI" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:30:56)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">08: Taking a bite out of 100GB files by Betty DuBois</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=olhr1V5J-1c" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:11:33)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">09:&nbsp;<a href="https://lekensteyn.nl/files/wireshark-tls-debugging-sharkfest19us.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Debugging TLS issues with Wireshark</a>&nbsp;by Peter Wu</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=Ha4SLHceF6w" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:10:44)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">10: IPv6 troubleshooting with Wireshark by Jeff Carrell</li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">11:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/11.key" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">When TCP reassembly gets complicated</a>&nbsp;by Tom Peterson</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=D9GHb4QQI6Q" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(41:47)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">12: Jumbo frames &amp; how to catch them by Patrick Kinnison</li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">13: Kismet &amp; wireless security 101 by Mike Kershaw</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=Kk4sImFR4z4" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:20:16)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">14: Tracing the untraceable with Wireshark: a view under the hood by Roland Knall</li>
</ul>
</h3>
<h3 class="post-title2" style="box-sizing:border-box;font-family:sans-serif;font-weight:100;line-height:1.1;color:rgba(0, 0, 0, 0.8);margin-top:20px;margin-bottom:10px;font-size:24px;background-color:rgba(255, 255, 255, 0.7);padding:5px 5px 5px 0px;text-transform:uppercase;letter-spacing:2px;"><span style="box-sizing:border-box;font-weight:700;font-size:14px;">WEDNESDAY CLASSES</span></h3>
<h3 class="post-title2" style="box-sizing:border-box;font-family:sans-serif;font-weight:100;line-height:1.1;color:rgba(0, 0, 0, 0.8);margin-top:20px;margin-bottom:10px;font-size:24px;background-color:rgba(255, 255, 255, 0.7);padding:5px 5px 5px 0px;text-transform:uppercase;letter-spacing:2px;"><ul style="box-sizing:border-box;margin-top:0px;margin-bottom:10px;list-style:none;color:#333333;font-family:Oswald, &quot;Helvetica Neue&quot;, Helvetica, Arial, sans-serif;font-size:14px;text-transform:none;background-color:#ffffff;"><li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">15:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/15.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Automating cloud infrastructure for analysis of large network captures</a>&nbsp;by Brad Palm &amp; Brian Greunke</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=MdjlHy2aFJc" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:30:15)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">16:<a href="https://sharkfestus.wireshark.org/assets/presentations19/16.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">&nbsp;My TCP ain't your TCP - ain't no TCP?&nbsp;</a>by Simon Lindermann</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=2coqZ07-Yhw" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:26:14)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">17:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/17.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">TLS1.3, DNS over HTTPs, DNS over TLS, QUIC, IPv6 PDM &amp; more!</a>by Nalini Elkins</li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">18: Practical Tracewrangling: Exploring capture file manipulation/extraction by Jasper Bongertz</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=n1IKMoQE7yY" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:24:32)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">19:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/19.zip" title="Presentation slides" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">TCP SACK overview &amp; impact on performance&nbsp;</a>by John Pittle</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=6cNVEc2nQUk" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:11:54)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">20: IPv6 security assessment tools (aka IPv6 hacking tools) by Jeff Carrell</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=G9coloYylBc" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:35:25)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">21: Troubleshooting slow networks by Chris Greer</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=h9stVIfug5Y" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>(1:10:57)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">22: Analyzing Windows malware traffic with Wireshark (Part 1) by Brad Duncan</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=eQItiKZpuSc" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>(1:10:57)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">23:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/07-23.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">To send or not to send? How TCP congestion control algorithms work</a>&nbsp;by Vladimir Gerasimov</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=EO8BaUwQHNI" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:30:56)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">24: The packet doctors are in! Packet trace examinations with the experts by Drs. Blok, Bongertz, and Landström</li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">25: Analyzing Windows malware traffic with Wireshark (Part 2) by Brad Duncan</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://youtu.be/ibSqqWZq9sk" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:04:26)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">26:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/02-26.pptx" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">TLS encryption &amp; decryption: what every IT engineer should know about TLS</a>&nbsp;by Ross Bagurdes</li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">27: Developer bytes lightning talks by Wireshark Core Developers</li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">28:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/28-37.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Wireshark visualization TIPS &amp; tricks</a>&nbsp;by Megumi Takeshita</li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">29:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/32.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Kismet &amp; wireless security 101</a>&nbsp;by Mike Kershaw</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=Kk4sImFR4z4" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:20:16)</li>
</ul>
</ul>
</h3>
<h3 class="post-title2" style="box-sizing:border-box;font-family:sans-serif;font-weight:100;line-height:1.1;color:rgba(0, 0, 0, 0.8);margin-top:20px;margin-bottom:10px;font-size:24px;background-color:rgba(255, 255, 255, 0.7);padding:5px 5px 5px 0px;text-transform:uppercase;letter-spacing:2px;"><span style="box-sizing:border-box;font-weight:700;font-size:14px;">THURSDAY CLASSES</span></h3>
<h3 class="post-title2" style="box-sizing:border-box;font-family:sans-serif;font-weight:100;line-height:1.1;color:rgba(0, 0, 0, 0.8);margin-top:20px;margin-bottom:10px;font-size:24px;background-color:rgba(255, 255, 255, 0.7);padding:5px 5px 5px 0px;text-transform:uppercase;letter-spacing:2px;"><ul style="box-sizing:border-box;margin-top:0px;margin-bottom:10px;list-style:none;color:#333333;font-family:Oswald, &quot;Helvetica Neue&quot;, Helvetica, Arial, sans-serif;font-size:14px;text-transform:none;background-color:#ffffff;"><li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">30:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/30.pptx" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Using Wireshark to solve real problems for real people: step-by-step case studies in packet analysis</a>&nbsp;by Kary Rogers</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=ClqlK7OEFCc" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:20:01)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">31:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/31.zip" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">TCP split brain: compare/contrast TCP effects on client &amp; server with Wireshark (Part 1)</a>&nbsp;by John Pittle</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=7uC1CLq8BaI" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:24:11)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">32:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/32.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Kismet &amp; wireless security 101</a>&nbsp;by Mike Kershaw</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=Kk4sImFR4z4" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:20:16)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">33: Capture file format deep dive by Jasper Bongertz</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://youtu.be/IZ439VNvJqo" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:11:14)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">34:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/34.zip" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">TCP split brain: compare/contrast TCP effects on client &amp; server with Wireshark (Part 2)</a>&nbsp;by John Pittle</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=YpiORadeiy0" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:27:25)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">35: Solving the impossible by Mike Canney</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://youtu.be/YLg91sAcQdw" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:02:20)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">36: A deep dive into LDAP: Everything you need to know to debug and troubleshoot LDAP packets by Betty DuBois</li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">37:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/28-37.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Wireshark visualization TIPS &amp; tricks</a>&nbsp;by Megumi Takeshita</li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">38: Enrich your network visibility &amp; analysis with Wireshark &amp; ELK by Tajul Ariffin</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://youtu.be/IXdR3HWDB7A" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:05:55)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">39: A walkthrough of the SharkFest Group &amp; Individual Packet Challenges by Sake Blok, Christian Landström, and Jasper Bongertz</li>
</ul>
</h3> <a href="http://www.vants.org/?post=300">阅读全文&gt;&gt;</a><div id="related_log" style="font-size:12px"><p><b>相关日志：</b></p><p><a href="http://www.vants.org/?post=285">MOTS攻击之TCP攻击</a></p><p><a href="http://www.vants.org/?post=289">某省厅门户网站A市局访问异常应急处置</a></p><p><a href="http://www.vants.org/?post=261">SharkFest'15 Retrospective</a></p><p><a href="http://www.vants.org/?post=281">MOTS攻击技术分析</a></p><p><a href="http://www.vants.org/?post=196">【转】中科院《个人隐私泄露风险的技术研究报告V1.0》的部分内容</a></p></div>]]></description>
	<pubDate>Thu, 05 Nov 2020 01:39:00 +0000</pubDate>
	<author>易隐者</author>
	<guid>http://www.vants.org/?post=300</guid>

</item>
<item>
	<title>三实“捕影”2018招人计划</title>
	<link>http://www.vants.org/?post=297</link>
	<description><![CDATA[<p style="margin:7.8pt 0cm 0.0001pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:18pt;"><span style="color:#515151;font-family:&quot;微软雅黑, sans-serif&quot;;"><span style="font-size:24px;font-family:&quot;Microsoft YaHei&quot;;">0x01 小组介绍</span></span></p>
<p style="margin:7.8pt 0cm 0.0001pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:18pt;"><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">“捕影”应急响应小组是安徽三实公司旗下专门负责网络疑难故障处置、安全事件应急响应、业务系统性能优化、日志分析的团队。<span lang="EN-US"><o:p></o:p></span></span></p>
<h1 style="margin-left:18pt;text-indent:-18pt;"><br />
</h1>
<div><span style="font-family:microsoftyahei;font-size:24px;">&nbsp; &nbsp;0x02&nbsp;&nbsp;小组荣誉</span></div>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">1.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">公安部一所网防<span lang="EN-US">G01</span>安徽技术支撑团队；<span lang="EN-US"><o:p></o:p></span></span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">2.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">安徽省公安厅网安总队技术支撑团队；<span lang="EN-US"><o:p></o:p></span></span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">3.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">安徽唯一一支专注于网络疑难杂症与黑客攻击入侵应急响应的团队；<span lang="EN-US"><o:p></o:p></span></span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">4.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">协助政企金融用户处理数百起网络疑难故障；<span lang="EN-US"><o:p></o:p></span></span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">5.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">协助多地网安与用户处理数百起黑客入侵事件；<span lang="EN-US"><o:p></o:p></span></span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">6.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">在<span lang="EN-US">freebuf</span>、团队博客蚂蚁网上发表了数百篇专业疑难故障与应急响应类文章；<span lang="EN-US"><o:p></o:p></span></span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">7.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">安徽省<span lang="EN-US">19</span>大网络安全应急保障工作、组织几十家用户的应急演练；<span lang="EN-US"><o:p></o:p></span></span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">8.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">多次为安徽省公安厅、安徽省经信委、各地市公安<span lang="EN-US">/</span>网信办提供技术培训和讲座；<span lang="EN-US"><o:p></o:p></span></span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">9.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">多位网络分析专家<span lang="EN-US">/</span>应急服务专业级工程师<span lang="EN-US">/CISP/</span>各种安全厂商认证工程师；<span lang="EN-US"><o:p></o:p></span></span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">10.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">团队博客<span lang="EN-US">www.vants.org</span>、<span lang="EN-US">www.freebuf.com/author/feiniao</span>。<span lang="EN-US"><o:p></o:p></span></span></p>
<p style="margin-left:18pt;text-indent:-18pt;"></p>
<h2 style="margin-left:36pt;text-indent:-36pt;"><span style="font-size:24px;">&nbsp; &nbsp; 0x03 招人计划</span></h2>
<h2 style="margin-left:36pt;text-indent:-36pt;"><span lang="EN-US"><span style="font-weight:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;</span></span><span style="font-family:宋体;">助理工程师</span><span lang="EN-US"><o:p></o:p></span></h2>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">1.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">熟悉常见网络结构<span lang="EN-US"><o:p></o:p></span></span><span style="color:#515151;font-family:微软雅黑, sans-serif;font-size:14px;">；</span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">2.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">了解基本的网络原理<span lang="EN-US">(</span>交换机、路由器、防火墙等<span lang="EN-US">)<o:p></o:p></span></span><span style="color:#515151;font-family:微软雅黑, sans-serif;font-size:14px;">；</span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">3.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">掌握<span lang="EN-US">wireshark</span>、科来等抓包软件的使用；能够在故障现场根据具体故障现象抓取相应的数据包</span><span style="color:#515151;font-family:微软雅黑, sans-serif;font-size:14px;">；</span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">4.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">了解常见的网络设备、服务器、登录配置操作<span lang="EN-US"><o:p></o:p></span></span><span style="color:#515151;font-family:微软雅黑, sans-serif;font-size:14px;">；</span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">5.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">了解常见安全设备、存储设备、虚拟化的工作机制和原理，能够完成常规的操作；<span lang="EN-US"><o:p></o:p></span></span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">6.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">能与用户沟通，完成日常工作，并撰写报告；<span lang="EN-US"><o:p></o:p></span></span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">7.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">常规问题的分析和解决<span lang="EN-US"><o:p></o:p></span></span><span style="color:#515151;font-family:微软雅黑, sans-serif;font-size:14px;">；</span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">8.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">协助团队负责人完成其他常规工作。<span lang="EN-US"><o:p></o:p></span></span></p>
<h2 style="margin-left:36pt;text-indent:-36pt;"><span style="font-family:宋体;">技术工程师</span><span lang="EN-US"><o:p></o:p></span></h2>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">1.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">具备一定的安全能力，熟悉网络安全与<span lang="EN-US">web</span>安全的原理<span lang="EN-US"><o:p></o:p></span></span><span style="color:#515151;font-family:微软雅黑, sans-serif;font-size:14px;">；</span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">2.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">了解常见攻击方式，如<span lang="EN-US">xss</span>、<span lang="EN-US">sql</span>注入、文件上传等原理<span lang="EN-US"><o:p></o:p></span></span><span style="color:#515151;font-family:微软雅黑, sans-serif;font-size:14px;">；</span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">3.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">熟悉主流安全设备的工作原理<span lang="EN-US"><o:p></o:p></span></span><span style="color:#515151;font-family:微软雅黑, sans-serif;font-size:14px;">；</span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">4.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">具有一定的分析和处理入侵事件的能力<span lang="EN-US"><o:p></o:p></span></span><span style="color:#515151;font-family:微软雅黑, sans-serif;font-size:14px;">；</span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">5.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">具备一定的日志分析能力，能够通过日志分析黑客攻击的痕迹<span lang="EN-US"><o:p></o:p></span></span><span style="color:#515151;font-family:微软雅黑, sans-serif;font-size:14px;">；</span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">6.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">熟悉<span lang="EN-US">TCP/IP</span>协议，对数据包有一定的分析能力<span lang="EN-US"><o:p></o:p></span></span><span style="color:#515151;font-family:微软雅黑, sans-serif;font-size:14px;">；</span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">7.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">熟悉主流的网络设备<span lang="EN-US">,</span>了解网络设备的工作原理<span lang="EN-US"><o:p></o:p></span></span><span style="color:#515151;font-family:微软雅黑, sans-serif;font-size:14px;">；</span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">8.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">能够独立处理日常的工作<span lang="EN-US"><o:p></o:p></span></span><span style="color:#515151;font-family:微软雅黑, sans-serif;font-size:14px;">；</span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">9.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">独立撰写用户服务过程文档。<span lang="EN-US"><o:p></o:p></span></span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">(</span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">以上至少满足<span lang="EN-US">5</span>条<span lang="EN-US">)<o:p></o:p></span></span></p>
<h2 style="margin-left:36pt;text-indent:-36pt;"><span lang="EN-US"><span style="font-weight:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;</span></span><span style="font-family:宋体;">中高级安全工程师</span><span lang="EN-US"><o:p></o:p></span></h2>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">1.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">精通<span lang="EN-US">TCP/IP</span>原理，具有独立解决用户网络疑难故障的能力<span lang="EN-US"><o:p></o:p></span></span><span style="color:#515151;font-family:微软雅黑, sans-serif;font-size:14px;">；</span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">2.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">深入理解应急响应的流程、具体步骤，可独立进行安全事件的应急处置<span lang="EN-US"><o:p></o:p></span></span><span style="color:#515151;font-family:微软雅黑, sans-serif;font-size:14px;">；</span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">3.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">了解<span lang="EN-US">IT</span>项目管理知识体系<span lang="EN-US">,</span>能够胜任公司大型安全服务项目经理</span><span style="color:#515151;font-family:微软雅黑, sans-serif;font-size:14px;">；</span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">4.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">撰写体系化的技术文档并进行团队分享。<span lang="EN-US"><o:p></o:p></span></span></p>
<h2 style="margin-left:36pt;text-indent:-36pt;"><span lang="EN-US"><span style="font-weight:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;</span></span><span lang="EN-US">C</span><span style="font-family:宋体;">开发工程师</span><span lang="EN-US"><o:p></o:p></span></h2>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">1.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">独立完成系统模块开发、维护，按计划完成各个模块日常开发工作；<span lang="EN-US"><o:p></o:p></span></span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">2.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">配合同事以及上级领导制定软件开发方案<span lang="EN-US"><o:p></o:p></span></span><span style="color:#515151;font-family:微软雅黑, sans-serif;font-size:14px;">；</span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">3.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">解决项目中因程序引起的故障问题；<span lang="EN-US"><o:p></o:p></span></span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">4.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">项目维护和新功能模块开发；<span lang="EN-US"><o:p></o:p></span></span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">5.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">良好的代码编写习惯、以及技术文档书写能力</span><span style="color:#515151;font-family:微软雅黑, sans-serif;font-size:14px;">；</span></p>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:-18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">6.<span style="font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;&nbsp;</span></span><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">良好的沟通与表达能力、思路清晰，较强的动手能力与逻辑分析能力。<span lang="EN-US"><o:p></o:p></span></span></p>
<h1 style="margin-left:18pt;text-indent:-18pt;"><span lang="EN-US"><span style="font-stretch:normal;line-height:normal;">&nbsp;&nbsp;&nbsp;&nbsp;0x04&nbsp;</span><span style="font-weight:normal;font-stretch:normal;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp;</span></span><span style="font-family:宋体;">联系方式</span><span lang="EN-US"><o:p></o:p></span></h1>
<h2 style="margin-left:36pt;text-indent:-36pt;">&nbsp;<span style="font-family:宋体;">地址</span><span lang="EN-US"><o:p></o:p></span></h2>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;"><span style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">合肥市高新区长江西路<span lang="EN-US">118</span>号<span lang="EN-US">5F</span>创业园<span lang="EN-US">A</span>座<span lang="EN-US">408。<o:p></o:p></span></span></p>
<h2 style="margin-left:36pt;text-indent:-36pt;"><span style="font-family:宋体;">联系方式</span><span lang="EN-US"><o:p></o:p></span></h2>
<p style="margin:7.8pt 0cm 0.0001pt 18pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;"><a href="tel:132%209551%202120">Tel:132 9551 2120</a><o:p></o:p></span></p>
<p style="margin:7.8pt 0cm 0.0001pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:18pt;"></p>
<p style="margin:7.8pt 0cm 0.0001pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-attachment:initial;background-origin:initial;background-clip:initial;text-indent:18pt;"><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;">Mail:liuqy@ahsss.com.cn<o:p></o:p></span></p>
<div><span lang="EN-US" style="font-size:10.5pt;font-family:微软雅黑, sans-serif;color:#515151;"><br />
</span></div> <a href="http://www.vants.org/?post=297">阅读全文&gt;&gt;</a><div id="related_log" style="font-size:12px"><p><b>相关日志：</b></p><p><a href="http://www.vants.org/?post=253">工作机会-英雄帖</a></p><p><a href="http://www.vants.org/?post=198">更换设备后业务访问故障案例</a></p><p><a href="http://www.vants.org/?post=285">MOTS攻击之TCP攻击</a></p><p><a href="http://www.vants.org/?post=289">某省厅门户网站A市局访问异常应急处置</a></p><p><a href="http://www.vants.org/?post=261">SharkFest'15 Retrospective</a></p></div>]]></description>
	<pubDate>Fri, 26 Jan 2018 05:45:27 +0000</pubDate>
	<author>飞鸟</author>
	<guid>http://www.vants.org/?post=297</guid>

</item>
<item>
	<title>省局门户网站地市信息公开栏目访问异常应急处置</title>
	<link>http://www.vants.org/?post=291</link>
	<description><![CDATA[<div><b><span style="font-size:24px;font-family:SimSun;">1 情况概述</span></b></div>
<p><b><span style="font-size:18px;font-family:SimSun;">1.1 拓扑结构</span></b></p>
<p style="text-align:center;"><a target="_blank" href="/content/plugins/kl_album/upload/201712/a78f6ec317dabb617687f2daa49907d320171202113933331344233.jpg"><img src="/content/plugins/kl_album/upload/201712/a78f6ec317dabb617687f2daa49907d320171202113933331344233.jpg" width="480" height="331" alt="点击查看原图" border="0" /></a></p>
<p style="text-align:left;"><span style="font-size:12.0pt;mso-bidi-font-size:11.0pt;line-height:150%;font-family:宋体;mso-bidi-font-family:&quot;timesnewroman&quot;;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:zh-cn;mso-bidi-language:AR-SA;">&nbsp;&nbsp;&nbsp;服务器通过交换机、<span lang="EN-US">WAF</span>、<span lang="EN-US">IPS</span>，经防火墙映射对外提供服务，办公外网与互联网通过出口交换机访问服务器。</span></p>
<p style="text-align:left;"><span style="font-size:12.0pt;mso-bidi-font-size:11.0pt;line-height:150%;font-family:宋体;mso-bidi-font-family:&quot;timesnewroman&quot;;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:zh-cn;mso-bidi-language:AR-SA;"><b><span style="font-size:18px;font-family:SimSun;">1.2 情况简介</span></b></span></p>
<p style="text-align:left;"><span style="line-height:150%;font-size:16px;"><span style="font-family:宋体;">&nbsp;&nbsp;&nbsp;2017年11月17日有市局反应省局门户网站地市信息公开栏目访问异常。</span></span></p>
<p style="text-align:center;"><span style="line-height:150%;font-size:16px;"><span style="font-family:宋体;"><a target="_blank" href="/content/plugins/kl_album/upload/201712/a22edd59e36d0a19430767b1db373868201712021139321710368674.jpg"><img src="/content/plugins/kl_album/upload/201712/a22edd59e36d0a19430767b1db373868201712021139321710368674.jpg" width="480" height="93" alt="点击查看原图" border="0" /></a></span></span></p>
<p style="text-align:left;"><span style="line-height:150%;font-size:16px;font-family:SimSun;">&nbsp;&nbsp;&nbsp;点击信息公开栏目后如下图所示：</span></p>
<p style="text-align:center;"><span style="line-height:150%;font-size:16px;"><span style="font-family:宋体;"><a target="_blank" href="/content/plugins/kl_album/upload/201712/c79746c261b636255db39672a3b3db5820171202113932655752823.jpg"><img src="/content/plugins/kl_album/upload/201712/c79746c261b636255db39672a3b3db5820171202113932655752823.jpg" width="480" height="234" alt="点击查看原图" border="0" /></a><br />
</span></span></p>
<p style="text-align:left;"><span style="line-height:150%;font-size:16px;font-family:SimSun;">&nbsp;&nbsp;&nbsp;大部分市局...</span></p> <a href="http://www.vants.org/?post=291">阅读全文&gt;&gt;</a><div id="related_log" style="font-size:12px"><p><b>相关日志：</b></p><p><a href="http://www.vants.org/?post=198">更换设备后业务访问故障案例</a></p><p><a href="http://www.vants.org/?post=214">IDS异常导致业务访问故障的案例</a></p><p><a href="http://www.vants.org/?post=216">策略误报导致应用保存失败的分析案例</a></p><p><a href="http://www.vants.org/?post=199">由TCP保活引起的业务访问故障案例</a></p><p><a href="http://www.vants.org/?post=290">省厅A登陆省厅B预算系统异常应急处置</a></p></div>]]></description>
	<pubDate>Sat, 02 Dec 2017 03:40:06 +0000</pubDate>
	<author>竹林再遇北极熊</author>
	<guid>http://www.vants.org/?post=291</guid>

</item>
<item>
	<title>省厅A登陆省厅B预算系统异常应急处置</title>
	<link>http://www.vants.org/?post=290</link>
	<description><![CDATA[<p><span style="font-size:24px;font-family:SimSun;"><b>1 情况概述</b></span></p>
<div><span style="font-size:18px;font-family:SimSun;"><b>1.1 拓扑结构</b></span></div>
<p><span style="font-size:16px;"><span style="font-family:SimSun;"><img src="http://a1.qpic.cn/psb?/V11RnYOl0lXM7A/mbrdj9HkwbW.0wOCH7CEI*cAZ3VEuGgcGx07dG6jHmQ!/b/dA4BAAAAAAAA&amp;bo=0AOAAgAAAAARB2E!&amp;rf=viewer_4.jpg" width="680" height="459" alt="" border="0" /></span></span></p>
<p><span style="font-family:SimSun;"><span style="font-size:16px;">&nbsp;&nbsp;&nbsp;如上拓扑所述，省厅A的客户端1和客户端2属于两个不同的安全域，通过防火墙代理，经过互联网，访问省厅B一台层层安全防护的预算系统服务器。</span></span></p>
<p><span style="font-family:SimSun;"><span style="font-size:16px;"><b><span style="font-size:18px;">1.2 情况简介</span></b></span></span></p>
<p><span style="font-family:SimSun;"><span style="font-size:16px;">&nbsp; &nbsp;预算系统分别使用B/S、C/S架构对外提供服务，服务端域名是xxx.com，解析后的公网IP分别是X.X.X.155和X.X.X.22，浏览器访问比客户端访问多...</span></span></p> <a href="http://www.vants.org/?post=290">阅读全文&gt;&gt;</a><div id="related_log" style="font-size:12px"><p><b>相关日志：</b></p><p><a href="http://www.vants.org/?post=198">更换设备后业务访问故障案例</a></p><p><a href="http://www.vants.org/?post=214">IDS异常导致业务访问故障的案例</a></p><p><a href="http://www.vants.org/?post=216">策略误报导致应用保存失败的分析案例</a></p><p><a href="http://www.vants.org/?post=199">由TCP保活引起的业务访问故障案例</a></p><p><a href="http://www.vants.org/?post=231">又遇TCP协议栈异常问题</a></p></div>]]></description>
	<pubDate>Tue, 28 Nov 2017 13:59:27 +0000</pubDate>
	<author>竹林再遇北极熊</author>
	<guid>http://www.vants.org/?post=290</guid>

</item>
<item>
	<title>某省厅门户网站A市局访问异常应急处置</title>
	<link>http://www.vants.org/?post=289</link>
	<description><![CDATA[<p><b><span style="font-family:宋体;font-size:24px;">1 情况概述</span></b></p>
<p><a name="_Toc468049190" style="text-indent:-32.25pt;"><b><span lang="EN-US" style="font-family:宋体;font-size:18px;">1.1<span style="font-variant-numeric:normal;font-stretch:normal;font-size:18px;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp; </span></span><span style="font-family:宋体;font-size:18px;">网络拓扑结构</span></b></a></p>
<p><a name="_Toc468049190" style="text-indent:-32.25pt;"><span style="font-size:12.0pt;mso-bidi-font-size:11.0pt;line-height:150%;font-family:宋体;mso-ascii-font-family:Calibri;mso-fareast-theme-font:minor-fareast;mso-hansi-font-family:Calibri;mso-bidi-font-family:&quot;timesnewroman&quot;;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:zh-cn;mso-bidi-language:AR-SA;">&nbsp; &nbsp;&nbsp;</span></a><span style="font-family:SimSun;font-size:16px;text-indent:-28px;">梳理</span><a name="_Toc468049190" style="text-indent:-32.25pt;"><span style="font-size:12.0pt;mso-bidi-font-size:11.0pt;line-height:150%;font-family:宋体;mso-ascii-font-family:Calibri;mso-fareast-theme-font:minor-fareast;mso-hansi-font-family:Calibri;mso-bidi-font-family:&quot;timesnewroman&quot;;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:zh-cn;mso-bidi-language:AR-SA;">省厅网络拓扑结构，了解WEB服务器通过接入交换机、WAF、抗D，经防火墙对外映射对外提供服务，其中交换机、抗D、WAF均为二层部署，</span></a><a name="_Toc468049190" style="text-indent:-32.25pt;"><span style="font-size:12pt;line-height:24px;font-family:宋体;">如下图所示</span></a><a name="_Toc468049190" style="text-indent:-32.25pt;"><span style="font-size:12.0pt;mso-bidi-font-size:11.0pt;line-height:150%;font-family:宋体;mso-ascii-font-family:Calibri;mso-fareast-theme-font:minor-fareast;mso-hansi-font-family:Calibri;mso-bidi-font-family:&quot;timesnewroman&quot;;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:zh-cn;mso-bidi-language:AR-SA;">：</span></a></p>
<p><a name="_Toc468049190" style="text-indent:-32.25pt;"><span style="font-size:12.0pt;mso-bidi-font-size:11.0pt;line-height:150%;font-family:宋体;mso-ascii-font-family:Calibri;mso-fareast-theme-font:minor-fareast;mso-hansi-font-family:Calibri;mso-bidi-font-family:&quot;timesnewroman&quot;;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:zh-cn;mso-bidi-language:AR-SA;"><img src="http://a3.qpic.cn/psb?/V11RnYOl1qiebG/b3afZaCJHtoJ5KtiuUknh5weM77Ub61jzrEIzFeeNQ8!/b/dOAAAAAAAAAA&amp;bo=WwPlAAAAAAARB40!&amp;rf=viewer_4.jpg" alt="" border="0" /><br />
</span></a></p>
<p><a name="_Toc468049190" style="text-indent:-32.25pt;"><span style="font-size:12.0pt;mso-bidi-font-size:11.0pt;line-height:150%;font-family:宋体;mso-ascii-font-family:Calibri;mso-fareast-theme-font:minor-fareast;mso-hansi-font-family:Calibri;mso-bidi-font-family:&quot;timesnewroman&quot;;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:zh-cn;mso-bidi-language:AR-SA;"><b><span style="font-size:18px;">1.2 情况简介</span></b></span></a></p>
<p><a name="_Toc468049190" style="text-indent:-32.25pt;"><span style="font-size:12.0pt;mso-bidi-font-size:11.0pt;line-height:150%;font-family:宋体;mso-ascii-font-family:Calibri;mso-fareast-theme-font:minor-fareast;mso-hansi-font-family:Calibri;mso-bidi-font-family:&quot;timesnewroman&quot;;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:zh-cn;mso-bidi-language:AR-SA;"><span style="font-size:12pt;line-height:150%;">&nbsp; &nbsp; A市局近期有无法访问省厅门户网站的现象，换个</span><span lang="EN-US" style="font-size:12.0pt;mso-bidi-font-size:11.0pt;line-height:150%;font-family:&quot;calibri&quot;,sans-serif;mso-fareast-font-family:宋体;mso-fareast-theme-font:minor-fareast;mso-bidi-font-family:&quot;timesnewroman&quot;;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:ZH-CN;mso-bidi-language:AR-SA;">IP</span><span style="font-size:12pt;line-height:150%;">即可正常访问，与省厅沟通后发现其他市局和互联网用户均能正常访问。</span></span></a></p>
<p><a name="_Toc468049190" style="text-indent:-32.25pt;"><span style="font-size:12.0pt;mso-bidi-font-size:11.0pt;line-height:150%;font-family:宋体;mso-ascii-font-family:Calibri;mso-fareast-theme-font:minor-fareast;mso-hansi-font-family:Calibri;mso-bidi-font-family:&quot;timesnewroman&quot;;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:zh-cn;mso-bidi-language:AR-SA;"><span style="font-size:18px;line-height:150%;"><b>1.3 分析思...</b></span></span></a></p> <a href="http://www.vants.org/?post=289">阅读全文&gt;&gt;</a><div id="related_log" style="font-size:12px"><p><b>相关日志：</b></p><p><a href="http://www.vants.org/?post=224">【转】博主是傻X</a></p><p><a href="http://www.vants.org/?post=161">交换机等网络设备端口镜像设置系列文章的说明</a></p><p><a href="http://www.vants.org/?post=15">日志同步功能测试</a></p><p><a href="http://www.vants.org/?post=145">Linktrust SG端口镜像设置</a></p><p><a href="http://www.vants.org/?post=279">某业务系统访问慢分析</a></p></div>]]></description>
	<pubDate>Tue, 28 Nov 2017 13:47:08 +0000</pubDate>
	<author>竹林再遇北极熊</author>
	<guid>http://www.vants.org/?post=289</guid>

</item></channel>
</rss>