﻿<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">
<channel>
<title><![CDATA[蚂蚁网-多维人生，三实而立！]]></title> 
<description><![CDATA[真实-不弄虚，不做假，做自己，不违心；
踏实-不浮躁，不盲从，不急功，不近利；
实学-不投机，不取巧，勤于学，精于业。]]></description>
<link>http://www.vants.org/</link>
<language>zh-cn</language>
<generator>www.emlog.net</generator>
<item>
	<title>SharkFest'20 Virtual Retrospective</title>
	<link>http://www.vants.org/?post=301</link>
	<description><![CDATA[<h3 class="post-title2" style="box-sizing:border-box;font-family:sans-serif;font-weight:100;line-height:1.1;color:rgba(0, 0, 0, 0.8);margin-top:20px;margin-bottom:10px;font-size:24px;background-color:rgba(255, 255, 255, 0.7);padding:5px 5px 5px 0px;text-transform:uppercase;letter-spacing:2px;"><span style="box-sizing:border-box;font-weight:700;font-size:14px;">THURSDAY SESSIONS</span></h3>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:10px;list-style:none;color:#333333;font-family:Oswald, &quot;Helvetica Neue&quot;, Helvetica, Arial, sans-serif;font-size:20px;letter-spacing:2px;"><li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">01:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/01.zip" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">BACNet and Wireshark for Beginners</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">by Werner Fischer</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/QxCMxXjqkyA" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">02:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/02.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Going down the retransmission hole</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">by Sake Blok</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/YupQjxPyuUQ" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">03: IPv6 security assessment tools (aka IPv6 hacking tools) by Graham Bloice</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/yNoBIpWt-v8" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">04: Improving packet capture in the DPDK by Stephen Hemminger</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/YhYZ-fGTa_s" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">05:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/05.pptx" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Kismet and Wireless Security 101</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">by Mike Kershaw</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/z6MzIDwjUmc" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">06: Packets! Wait... What? A very improvised last-minute Wireshark talk about things you can find in pcap files that are funny, interesting or weird. I don't know. Let's find out together by Jasper Bongertz</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/S7OsIOrvCKw" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">07: TLS encryption and decryption: What every IT engineer should know about TLS by Ross Bagurdes</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/9cAyDAbMtZY" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">08: Why an Enterprise Visibility Platform is critical for effective Packet Analysis? by Keval Shah</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/cFGC13xUvKg" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">09:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/09.zip" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Troubleshooting Cloud Network Outages by</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">Chris Hull</span></li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">10:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/10.zip" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">TCP SACK overview &amp; impact on performance (subject to change)</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">by John Pittle</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/4wEDcBZb7fU" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">11:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/11.zip" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Automation TIPS &amp; tricks Using Wireshark/tshark in Windows</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">by Megumi Takeshita</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/kv97gYCMM5Q" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">12:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/12.pptx" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">How Long is a Packet? And Does it Really Matter?</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">by Stephen Donnelly</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://www.youtube.com/watch?v=1fU8lvr1Zds" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
</ul>
<h3 class="post-title2" style="box-sizing:border-box;font-family:sans-serif;font-weight:100;line-height:1.1;color:rgba(0, 0, 0, 0.8);margin-top:20px;margin-bottom:10px;font-size:24px;background-color:rgba(255, 255, 255, 0.7);padding:5px 5px 5px 0px;text-transform:uppercase;letter-spacing:2px;"><span style="box-sizing:border-box;font-weight:700;font-size:14px;">FRIDAY SESSIONS</span></h3>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:10px;list-style:none;color:#333333;font-family:Oswald, &quot;Helvetica Neue&quot;, Helvetica, Arial, sans-serif;font-size:20px;letter-spacing:2px;"><li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">13: Make the bytes speak to you by Roland Knall</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/Sc9kDIidrxA" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">14:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/14.zip" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">USB Analysis 101</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">by Tomasz Moń</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/cUljKImph4s" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">15: TLS decryption examples by Peter Wu</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/v-lDEiA7JPE" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">16: The Packet Doctors are in! Packet trace examinations with the experts by Drs. Blok, Greer Landström, Rogers</span></li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">17:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/17.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Analyzing Honeypot Traffic</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">by Tom Peterson</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/aQJW3Kx56sY" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">18: Intrusion Analysis and Threat Hunting with Suricata by Josh Stroschein and Jack Mott</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/0WgyiOxCFzE" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">19: The Other Protocols (used in LTE) by Mark Stout</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/cUljKImph4s" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">20:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/20.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Practical Signature Development for Open Source IDS</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">by Jason Williams and Jack Mott</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/Y9tem2ryrbU" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">21:</span><span style="font-size:14px;">&nbsp;</span><a href="https://sharkfestvirtual.wireshark.org/assets/presentations20/21.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Ostinato - craft packets, generate traffic</span></a><span style="font-size:14px;">&nbsp;</span><span style="font-size:14px;">by Srivats P</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/1DIs2VIT3bI" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">22: Introduction to WAN Optimization by John Pittle</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/IyvlvmdbvZM" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">23: Solving Real World Case Studies by Kary Rogers</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/Iqk9waColDo" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><span style="font-size:14px;">24: Analyzing 802.11 Powersave Mechanisms with Wireshark by George Cragg</span></li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:#000000;list-style:none;"><a href="https://youtu.be/IFIuCHQBOfE" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Presentation Video</span></a></li>
</ul>
</ul> <a href="http://www.vants.org/?post=301">阅读全文&gt;&gt;</a><div id="related_log" style="font-size:12px"><p><b>相关日志：</b></p><p><a href="http://www.vants.org/?post=289">某省厅门户网站A市局访问异常应急处置</a></p><p><a href="http://www.vants.org/?post=261">SharkFest'15 Retrospective</a></p><p><a href="http://www.vants.org/?post=300">SharkFest'19 Retrospective</a></p><p><a href="http://www.vants.org/?post=196">【转】中科院《个人隐私泄露风险的技术研究报告V1.0》的部分内容</a></p><p><a href="http://www.vants.org/?post=280">见缝插针-DNS泛解析是怎么被黑客玩坏的</a></p></div>]]></description>
	<pubDate>Thu, 05 Nov 2020 01:57:31 +0000</pubDate>
	<author>易隐者</author>
	<guid>http://www.vants.org/?post=301</guid>

</item>
<item>
	<title>SharkFest'19 Retrospective</title>
	<link>http://www.vants.org/?post=300</link>
	<description><![CDATA[<h3 class="post-title2" style="box-sizing:border-box;font-family:sans-serif;font-weight:100;line-height:1.1;color:rgba(0, 0, 0, 0.8);margin-top:20px;margin-bottom:10px;font-size:24px;background-color:rgba(255, 255, 255, 0.7);padding:5px 5px 5px 0px;text-transform:uppercase;letter-spacing:2px;"><span style="box-sizing:border-box;font-weight:700;font-size:14px;">KEYNOTE PRESENTATIONS</span></h3>
<h4 style="box-sizing:border-box;font-family:sans-serif;font-weight:500;line-height:1.1;margin-top:10px;margin-bottom:10px;font-size:18px;"><span style="box-sizing:border-box;font-weight:700;"><a href="https://sharkfestus.wireshark.org/assets/presentations19/gerald-keynote.pptx" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;"><span style="font-size:14px;">Latest Wireshark Developments &amp; Road Map</span></a></span><br style="box-sizing:border-box;" />
<span style="font-size:14px;">Gerald Combs</span></h4>
<h3 class="post-title2" style="box-sizing:border-box;font-family:sans-serif;font-weight:100;line-height:1.1;color:rgba(0, 0, 0, 0.8);margin-top:20px;margin-bottom:10px;font-size:24px;background-color:rgba(255, 255, 255, 0.7);padding:5px 5px 5px 0px;text-transform:uppercase;letter-spacing:2px;"><p style="margin-top:10px;margin-bottom:10px;color:#000000;letter-spacing:normal;text-transform:none;box-sizing:border-box;line-height:1.1;font-size:18px;"><span style="font-size:14px;">TUESDAY CLASSES</span></p>
</h3>
<h3 class="post-title2" style="box-sizing:border-box;font-family:sans-serif;font-weight:100;line-height:1.1;color:rgba(0, 0, 0, 0.8);margin-top:20px;margin-bottom:10px;font-size:24px;background-color:rgba(255, 255, 255, 0.7);padding:5px 5px 5px 0px;text-transform:uppercase;letter-spacing:2px;"><ul style="box-sizing:border-box;margin-top:0px;margin-bottom:10px;list-style:none;color:#333333;font-family:Oswald, &quot;Helvetica Neue&quot;, Helvetica, Arial, sans-serif;font-size:14px;text-transform:none;background-color:#ffffff;"><li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">01:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/01.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">War story: troubleshooting issues on encrypted links</a>&nbsp;by Christian Landström</li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">02:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/02-26.pptx" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">TLS encryption &amp; decryption: What every IT engineer should know about TLS</a>&nbsp;by Ross Bagurdes</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=qbPOXoNXtGY" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:22:25)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">03:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/03.zip" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Writing a Wireshark Dissector: 3 ways to eat bytes</a>&nbsp;by Graham Bloice</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=Fp_7g5as1VY" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:18:07)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">04: Solving (SharkFest) packet capture challenges with only tshark by Sake Blok</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=gMg8ttIzry0" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:14:11)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">05:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/05.pptx" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">How long is a packet? And does it really matter?</a>&nbsp;by Stephen Donnelly</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=2GFCzAYSJx0&amp;list=PLz_ZpPUgiXqMeN9ly6-lbr6Gdf3mknGIe&amp;index=8&amp;t=0s" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:17:54)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">06: Creating dissectors like a pro by generating dissectors by Richard Sharpe</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=XFFkC4PdCbI&amp;list=PLz_ZpPUgiXqMeN9ly6-lbr6Gdf3mknGIe&amp;index=9&amp;t=0s" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:20:38)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">07:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/07-23.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">To Send or not to Send? How TCP congestion control algorithms work</a>&nbsp;by Vladimir Gerasimov</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=EO8BaUwQHNI" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:30:56)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">08: Taking a bite out of 100GB files by Betty DuBois</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=olhr1V5J-1c" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:11:33)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">09:&nbsp;<a href="https://lekensteyn.nl/files/wireshark-tls-debugging-sharkfest19us.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Debugging TLS issues with Wireshark</a>&nbsp;by Peter Wu</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=Ha4SLHceF6w" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:10:44)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">10: IPv6 troubleshooting with Wireshark by Jeff Carrell</li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">11:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/11.key" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">When TCP reassembly gets complicated</a>&nbsp;by Tom Peterson</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=D9GHb4QQI6Q" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(41:47)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">12: Jumbo frames &amp; how to catch them by Patrick Kinnison</li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">13: Kismet &amp; wireless security 101 by Mike Kershaw</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=Kk4sImFR4z4" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:20:16)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">14: Tracing the untraceable with Wireshark: a view under the hood by Roland Knall</li>
</ul>
</h3>
<h3 class="post-title2" style="box-sizing:border-box;font-family:sans-serif;font-weight:100;line-height:1.1;color:rgba(0, 0, 0, 0.8);margin-top:20px;margin-bottom:10px;font-size:24px;background-color:rgba(255, 255, 255, 0.7);padding:5px 5px 5px 0px;text-transform:uppercase;letter-spacing:2px;"><span style="box-sizing:border-box;font-weight:700;font-size:14px;">WEDNESDAY CLASSES</span></h3>
<h3 class="post-title2" style="box-sizing:border-box;font-family:sans-serif;font-weight:100;line-height:1.1;color:rgba(0, 0, 0, 0.8);margin-top:20px;margin-bottom:10px;font-size:24px;background-color:rgba(255, 255, 255, 0.7);padding:5px 5px 5px 0px;text-transform:uppercase;letter-spacing:2px;"><ul style="box-sizing:border-box;margin-top:0px;margin-bottom:10px;list-style:none;color:#333333;font-family:Oswald, &quot;Helvetica Neue&quot;, Helvetica, Arial, sans-serif;font-size:14px;text-transform:none;background-color:#ffffff;"><li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">15:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/15.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Automating cloud infrastructure for analysis of large network captures</a>&nbsp;by Brad Palm &amp; Brian Greunke</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=MdjlHy2aFJc" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:30:15)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">16:<a href="https://sharkfestus.wireshark.org/assets/presentations19/16.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">&nbsp;My TCP ain't your TCP - ain't no TCP?&nbsp;</a>by Simon Lindermann</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=2coqZ07-Yhw" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:26:14)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">17:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/17.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">TLS1.3, DNS over HTTPs, DNS over TLS, QUIC, IPv6 PDM &amp; more!</a>by Nalini Elkins</li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">18: Practical Tracewrangling: Exploring capture file manipulation/extraction by Jasper Bongertz</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=n1IKMoQE7yY" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:24:32)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">19:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/19.zip" title="Presentation slides" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">TCP SACK overview &amp; impact on performance&nbsp;</a>by John Pittle</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=6cNVEc2nQUk" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:11:54)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">20: IPv6 security assessment tools (aka IPv6 hacking tools) by Jeff Carrell</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=G9coloYylBc" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:35:25)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">21: Troubleshooting slow networks by Chris Greer</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=h9stVIfug5Y" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>(1:10:57)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">22: Analyzing Windows malware traffic with Wireshark (Part 1) by Brad Duncan</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=eQItiKZpuSc" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>(1:10:57)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">23:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/07-23.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">To send or not to send? How TCP congestion control algorithms work</a>&nbsp;by Vladimir Gerasimov</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=EO8BaUwQHNI" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:30:56)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">24: The packet doctors are in! Packet trace examinations with the experts by Drs. Blok, Bongertz, and Landström</li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">25: Analyzing Windows malware traffic with Wireshark (Part 2) by Brad Duncan</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://youtu.be/ibSqqWZq9sk" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:04:26)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">26:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/02-26.pptx" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">TLS encryption &amp; decryption: what every IT engineer should know about TLS</a>&nbsp;by Ross Bagurdes</li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">27: Developer bytes lightning talks by Wireshark Core Developers</li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">28:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/28-37.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Wireshark visualization TIPS &amp; tricks</a>&nbsp;by Megumi Takeshita</li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">29:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/32.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Kismet &amp; wireless security 101</a>&nbsp;by Mike Kershaw</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=Kk4sImFR4z4" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:20:16)</li>
</ul>
</ul>
</h3>
<h3 class="post-title2" style="box-sizing:border-box;font-family:sans-serif;font-weight:100;line-height:1.1;color:rgba(0, 0, 0, 0.8);margin-top:20px;margin-bottom:10px;font-size:24px;background-color:rgba(255, 255, 255, 0.7);padding:5px 5px 5px 0px;text-transform:uppercase;letter-spacing:2px;"><span style="box-sizing:border-box;font-weight:700;font-size:14px;">THURSDAY CLASSES</span></h3>
<h3 class="post-title2" style="box-sizing:border-box;font-family:sans-serif;font-weight:100;line-height:1.1;color:rgba(0, 0, 0, 0.8);margin-top:20px;margin-bottom:10px;font-size:24px;background-color:rgba(255, 255, 255, 0.7);padding:5px 5px 5px 0px;text-transform:uppercase;letter-spacing:2px;"><ul style="box-sizing:border-box;margin-top:0px;margin-bottom:10px;list-style:none;color:#333333;font-family:Oswald, &quot;Helvetica Neue&quot;, Helvetica, Arial, sans-serif;font-size:14px;text-transform:none;background-color:#ffffff;"><li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">30:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/30.pptx" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Using Wireshark to solve real problems for real people: step-by-step case studies in packet analysis</a>&nbsp;by Kary Rogers</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=ClqlK7OEFCc" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:20:01)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">31:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/31.zip" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">TCP split brain: compare/contrast TCP effects on client &amp; server with Wireshark (Part 1)</a>&nbsp;by John Pittle</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=7uC1CLq8BaI" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:24:11)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">32:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/32.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Kismet &amp; wireless security 101</a>&nbsp;by Mike Kershaw</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=Kk4sImFR4z4" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:20:16)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">33: Capture file format deep dive by Jasper Bongertz</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://youtu.be/IZ439VNvJqo" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:11:14)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">34:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/34.zip" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">TCP split brain: compare/contrast TCP effects on client &amp; server with Wireshark (Part 2)</a>&nbsp;by John Pittle</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://www.youtube.com/watch?v=YpiORadeiy0" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:27:25)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">35: Solving the impossible by Mike Canney</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://youtu.be/YLg91sAcQdw" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:02:20)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">36: A deep dive into LDAP: Everything you need to know to debug and troubleshoot LDAP packets by Betty DuBois</li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">37:&nbsp;<a href="https://sharkfestus.wireshark.org/assets/presentations19/28-37.pdf" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Wireshark visualization TIPS &amp; tricks</a>&nbsp;by Megumi Takeshita</li>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">38: Enrich your network visibility &amp; analysis with Wireshark &amp; ELK by Tajul Ariffin</li>
<ul style="box-sizing:border-box;margin-top:0px;margin-bottom:0px;list-style-type:none;"><li class="presVideo" style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;"><a href="https://youtu.be/IXdR3HWDB7A" title="Presentation video on YouTube" target="_blank" style="box-sizing:border-box;background-color:transparent;color:#337ab7;text-decoration-line:none;">Presentation Video</a>&nbsp;(1:05:55)</li>
</ul>
<li style="box-sizing:border-box;font-family:helvetica;letter-spacing:0.5px;color:black;list-style:none;">39: A walkthrough of the SharkFest Group &amp; Individual Packet Challenges by Sake Blok, Christian Landström, and Jasper Bongertz</li>
</ul>
</h3> <a href="http://www.vants.org/?post=300">阅读全文&gt;&gt;</a><div id="related_log" style="font-size:12px"><p><b>相关日志：</b></p><p><a href="http://www.vants.org/?post=285">MOTS攻击之TCP攻击</a></p><p><a href="http://www.vants.org/?post=289">某省厅门户网站A市局访问异常应急处置</a></p><p><a href="http://www.vants.org/?post=261">SharkFest'15 Retrospective</a></p><p><a href="http://www.vants.org/?post=281">MOTS攻击技术分析</a></p><p><a href="http://www.vants.org/?post=196">【转】中科院《个人隐私泄露风险的技术研究报告V1.0》的部分内容</a></p></div>]]></description>
	<pubDate>Thu, 05 Nov 2020 01:39:00 +0000</pubDate>
	<author>易隐者</author>
	<guid>http://www.vants.org/?post=300</guid>

</item>
<item>
	<title>省局门户网站地市信息公开栏目访问异常应急处置</title>
	<link>http://www.vants.org/?post=291</link>
	<description><![CDATA[<div><b><span style="font-size:24px;font-family:SimSun;">1 情况概述</span></b></div>
<p><b><span style="font-size:18px;font-family:SimSun;">1.1 拓扑结构</span></b></p>
<p style="text-align:center;"><a target="_blank" href="/content/plugins/kl_album/upload/201712/a78f6ec317dabb617687f2daa49907d320171202113933331344233.jpg"><img src="/content/plugins/kl_album/upload/201712/a78f6ec317dabb617687f2daa49907d320171202113933331344233.jpg" width="480" height="331" alt="点击查看原图" border="0" /></a></p>
<p style="text-align:left;"><span style="font-size:12.0pt;mso-bidi-font-size:11.0pt;line-height:150%;font-family:宋体;mso-bidi-font-family:&quot;timesnewroman&quot;;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:zh-cn;mso-bidi-language:AR-SA;">&nbsp;&nbsp;&nbsp;服务器通过交换机、<span lang="EN-US">WAF</span>、<span lang="EN-US">IPS</span>，经防火墙映射对外提供服务，办公外网与互联网通过出口交换机访问服务器。</span></p>
<p style="text-align:left;"><span style="font-size:12.0pt;mso-bidi-font-size:11.0pt;line-height:150%;font-family:宋体;mso-bidi-font-family:&quot;timesnewroman&quot;;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:zh-cn;mso-bidi-language:AR-SA;"><b><span style="font-size:18px;font-family:SimSun;">1.2 情况简介</span></b></span></p>
<p style="text-align:left;"><span style="line-height:150%;font-size:16px;"><span style="font-family:宋体;">&nbsp;&nbsp;&nbsp;2017年11月17日有市局反应省局门户网站地市信息公开栏目访问异常。</span></span></p>
<p style="text-align:center;"><span style="line-height:150%;font-size:16px;"><span style="font-family:宋体;"><a target="_blank" href="/content/plugins/kl_album/upload/201712/a22edd59e36d0a19430767b1db373868201712021139321710368674.jpg"><img src="/content/plugins/kl_album/upload/201712/a22edd59e36d0a19430767b1db373868201712021139321710368674.jpg" width="480" height="93" alt="点击查看原图" border="0" /></a></span></span></p>
<p style="text-align:left;"><span style="line-height:150%;font-size:16px;font-family:SimSun;">&nbsp;&nbsp;&nbsp;点击信息公开栏目后如下图所示：</span></p>
<p style="text-align:center;"><span style="line-height:150%;font-size:16px;"><span style="font-family:宋体;"><a target="_blank" href="/content/plugins/kl_album/upload/201712/c79746c261b636255db39672a3b3db5820171202113932655752823.jpg"><img src="/content/plugins/kl_album/upload/201712/c79746c261b636255db39672a3b3db5820171202113932655752823.jpg" width="480" height="234" alt="点击查看原图" border="0" /></a><br />
</span></span></p>
<p style="text-align:left;"><span style="line-height:150%;font-size:16px;font-family:SimSun;">&nbsp;&nbsp;&nbsp;大部分市局...</span></p> <a href="http://www.vants.org/?post=291">阅读全文&gt;&gt;</a><div id="related_log" style="font-size:12px"><p><b>相关日志：</b></p><p><a href="http://www.vants.org/?post=198">更换设备后业务访问故障案例</a></p><p><a href="http://www.vants.org/?post=214">IDS异常导致业务访问故障的案例</a></p><p><a href="http://www.vants.org/?post=216">策略误报导致应用保存失败的分析案例</a></p><p><a href="http://www.vants.org/?post=199">由TCP保活引起的业务访问故障案例</a></p><p><a href="http://www.vants.org/?post=290">省厅A登陆省厅B预算系统异常应急处置</a></p></div>]]></description>
	<pubDate>Sat, 02 Dec 2017 03:40:06 +0000</pubDate>
	<author>竹林再遇北极熊</author>
	<guid>http://www.vants.org/?post=291</guid>

</item>
<item>
	<title>省厅A登陆省厅B预算系统异常应急处置</title>
	<link>http://www.vants.org/?post=290</link>
	<description><![CDATA[<p><span style="font-size:24px;font-family:SimSun;"><b>1 情况概述</b></span></p>
<div><span style="font-size:18px;font-family:SimSun;"><b>1.1 拓扑结构</b></span></div>
<p><span style="font-size:16px;"><span style="font-family:SimSun;"><img src="http://a1.qpic.cn/psb?/V11RnYOl0lXM7A/mbrdj9HkwbW.0wOCH7CEI*cAZ3VEuGgcGx07dG6jHmQ!/b/dA4BAAAAAAAA&amp;bo=0AOAAgAAAAARB2E!&amp;rf=viewer_4.jpg" width="680" height="459" alt="" border="0" /></span></span></p>
<p><span style="font-family:SimSun;"><span style="font-size:16px;">&nbsp;&nbsp;&nbsp;如上拓扑所述，省厅A的客户端1和客户端2属于两个不同的安全域，通过防火墙代理，经过互联网，访问省厅B一台层层安全防护的预算系统服务器。</span></span></p>
<p><span style="font-family:SimSun;"><span style="font-size:16px;"><b><span style="font-size:18px;">1.2 情况简介</span></b></span></span></p>
<p><span style="font-family:SimSun;"><span style="font-size:16px;">&nbsp; &nbsp;预算系统分别使用B/S、C/S架构对外提供服务，服务端域名是xxx.com，解析后的公网IP分别是X.X.X.155和X.X.X.22，浏览器访问比客户端访问多...</span></span></p> <a href="http://www.vants.org/?post=290">阅读全文&gt;&gt;</a><div id="related_log" style="font-size:12px"><p><b>相关日志：</b></p><p><a href="http://www.vants.org/?post=198">更换设备后业务访问故障案例</a></p><p><a href="http://www.vants.org/?post=214">IDS异常导致业务访问故障的案例</a></p><p><a href="http://www.vants.org/?post=216">策略误报导致应用保存失败的分析案例</a></p><p><a href="http://www.vants.org/?post=199">由TCP保活引起的业务访问故障案例</a></p><p><a href="http://www.vants.org/?post=231">又遇TCP协议栈异常问题</a></p></div>]]></description>
	<pubDate>Tue, 28 Nov 2017 13:59:27 +0000</pubDate>
	<author>竹林再遇北极熊</author>
	<guid>http://www.vants.org/?post=290</guid>

</item>
<item>
	<title>某省厅门户网站A市局访问异常应急处置</title>
	<link>http://www.vants.org/?post=289</link>
	<description><![CDATA[<p><b><span style="font-family:宋体;font-size:24px;">1 情况概述</span></b></p>
<p><a name="_Toc468049190" style="text-indent:-32.25pt;"><b><span lang="EN-US" style="font-family:宋体;font-size:18px;">1.1<span style="font-variant-numeric:normal;font-stretch:normal;font-size:18px;line-height:normal;font-family:&quot;Times New Roman&quot;;">&nbsp; </span></span><span style="font-family:宋体;font-size:18px;">网络拓扑结构</span></b></a></p>
<p><a name="_Toc468049190" style="text-indent:-32.25pt;"><span style="font-size:12.0pt;mso-bidi-font-size:11.0pt;line-height:150%;font-family:宋体;mso-ascii-font-family:Calibri;mso-fareast-theme-font:minor-fareast;mso-hansi-font-family:Calibri;mso-bidi-font-family:&quot;timesnewroman&quot;;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:zh-cn;mso-bidi-language:AR-SA;">&nbsp; &nbsp;&nbsp;</span></a><span style="font-family:SimSun;font-size:16px;text-indent:-28px;">梳理</span><a name="_Toc468049190" style="text-indent:-32.25pt;"><span style="font-size:12.0pt;mso-bidi-font-size:11.0pt;line-height:150%;font-family:宋体;mso-ascii-font-family:Calibri;mso-fareast-theme-font:minor-fareast;mso-hansi-font-family:Calibri;mso-bidi-font-family:&quot;timesnewroman&quot;;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:zh-cn;mso-bidi-language:AR-SA;">省厅网络拓扑结构，了解WEB服务器通过接入交换机、WAF、抗D，经防火墙对外映射对外提供服务，其中交换机、抗D、WAF均为二层部署，</span></a><a name="_Toc468049190" style="text-indent:-32.25pt;"><span style="font-size:12pt;line-height:24px;font-family:宋体;">如下图所示</span></a><a name="_Toc468049190" style="text-indent:-32.25pt;"><span style="font-size:12.0pt;mso-bidi-font-size:11.0pt;line-height:150%;font-family:宋体;mso-ascii-font-family:Calibri;mso-fareast-theme-font:minor-fareast;mso-hansi-font-family:Calibri;mso-bidi-font-family:&quot;timesnewroman&quot;;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:zh-cn;mso-bidi-language:AR-SA;">：</span></a></p>
<p><a name="_Toc468049190" style="text-indent:-32.25pt;"><span style="font-size:12.0pt;mso-bidi-font-size:11.0pt;line-height:150%;font-family:宋体;mso-ascii-font-family:Calibri;mso-fareast-theme-font:minor-fareast;mso-hansi-font-family:Calibri;mso-bidi-font-family:&quot;timesnewroman&quot;;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:zh-cn;mso-bidi-language:AR-SA;"><img src="http://a3.qpic.cn/psb?/V11RnYOl1qiebG/b3afZaCJHtoJ5KtiuUknh5weM77Ub61jzrEIzFeeNQ8!/b/dOAAAAAAAAAA&amp;bo=WwPlAAAAAAARB40!&amp;rf=viewer_4.jpg" alt="" border="0" /><br />
</span></a></p>
<p><a name="_Toc468049190" style="text-indent:-32.25pt;"><span style="font-size:12.0pt;mso-bidi-font-size:11.0pt;line-height:150%;font-family:宋体;mso-ascii-font-family:Calibri;mso-fareast-theme-font:minor-fareast;mso-hansi-font-family:Calibri;mso-bidi-font-family:&quot;timesnewroman&quot;;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:zh-cn;mso-bidi-language:AR-SA;"><b><span style="font-size:18px;">1.2 情况简介</span></b></span></a></p>
<p><a name="_Toc468049190" style="text-indent:-32.25pt;"><span style="font-size:12.0pt;mso-bidi-font-size:11.0pt;line-height:150%;font-family:宋体;mso-ascii-font-family:Calibri;mso-fareast-theme-font:minor-fareast;mso-hansi-font-family:Calibri;mso-bidi-font-family:&quot;timesnewroman&quot;;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:zh-cn;mso-bidi-language:AR-SA;"><span style="font-size:12pt;line-height:150%;">&nbsp; &nbsp; A市局近期有无法访问省厅门户网站的现象，换个</span><span lang="EN-US" style="font-size:12.0pt;mso-bidi-font-size:11.0pt;line-height:150%;font-family:&quot;calibri&quot;,sans-serif;mso-fareast-font-family:宋体;mso-fareast-theme-font:minor-fareast;mso-bidi-font-family:&quot;timesnewroman&quot;;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:ZH-CN;mso-bidi-language:AR-SA;">IP</span><span style="font-size:12pt;line-height:150%;">即可正常访问，与省厅沟通后发现其他市局和互联网用户均能正常访问。</span></span></a></p>
<p><a name="_Toc468049190" style="text-indent:-32.25pt;"><span style="font-size:12.0pt;mso-bidi-font-size:11.0pt;line-height:150%;font-family:宋体;mso-ascii-font-family:Calibri;mso-fareast-theme-font:minor-fareast;mso-hansi-font-family:Calibri;mso-bidi-font-family:&quot;timesnewroman&quot;;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:zh-cn;mso-bidi-language:AR-SA;"><span style="font-size:18px;line-height:150%;"><b>1.3 分析思...</b></span></span></a></p> <a href="http://www.vants.org/?post=289">阅读全文&gt;&gt;</a><div id="related_log" style="font-size:12px"><p><b>相关日志：</b></p><p><a href="http://www.vants.org/?post=224">【转】博主是傻X</a></p><p><a href="http://www.vants.org/?post=161">交换机等网络设备端口镜像设置系列文章的说明</a></p><p><a href="http://www.vants.org/?post=15">日志同步功能测试</a></p><p><a href="http://www.vants.org/?post=145">Linktrust SG端口镜像设置</a></p><p><a href="http://www.vants.org/?post=279">某业务系统访问慢分析</a></p></div>]]></description>
	<pubDate>Tue, 28 Nov 2017 13:47:08 +0000</pubDate>
	<author>竹林再遇北极熊</author>
	<guid>http://www.vants.org/?post=289</guid>

</item>
<item>
	<title>某业务系统访问慢分析</title>
	<link>http://www.vants.org/?post=279</link>
	<description><![CDATA[<h1 style="margin-left:18pt;text-indent:-18pt;"><span style="font-weight:normal;"><span lang="EN-US">1.<span style="font-stretch:normal;line-height:normal;font-family:'Times New Roman';">&nbsp;&nbsp;&nbsp;&nbsp;</span></span>问题描述</span><span lang="EN-US"><o:p></o:p></span></h1>
<h1 style="margin-left:18pt;text-indent:-18pt;"><p class="MsoNormal" style="font-size:12px;font-weight:normal;line-height:18px;text-indent:21pt;"><span style="font-size:14px;">一用户内网系统对内提供业务办理业务，其省局和地市都需要访问改业务系统。最近一段时间，经常有地市反映登录较卡及办理业务时也很卡。经过对设备、链路、策略等方面的常规检查，并没有发现问题。近期，由于地市反映卡的现象较严重，用户体验较差，在这种情况下，“捕影”应急响应小组接手处置该问题。</span><span lang="EN-US"><o:p></o:p></span></p>
</h1>
<h1 style="margin-left:18pt;text-indent:-18pt;"><span style="font-weight:normal;"><span lang="EN-US">2.<span style="font-stretch:normal;line-height:normal;font-family:'Times New Roman';">&nbsp;&nbsp;&nbsp;&nbsp;</span></span>故障现象</span><span lang="EN-US"><o:p></o:p></span></h1>
<h1 style="margin-left:18pt;text-indent:-18pt;"><p class="MsoNormal" style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0px;"><span style="font-size:14px;">经了解与测试，发现在两个方面用户体验较差。</span><span lang="EN-US"><o:p></o:p></span></p>
<p class="MsoListParagraph" style="margin-left:38.85pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:-21pt;"><span lang="EN-US" style="font-family:Wingdings;font-size:14px;">Ø<span style="font-stretch:normal;line-height:normal;font-family:'Times New Roman';">&nbsp;&nbsp;</span></span><span style="font-size:14px;">登录</span><span lang="EN-US"><o:p></o:p></span></p>
<p class="MsoListParagraph" style="margin-left:38.85pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:0cm;"><span style="font-size:14px;">登录时一直在等待，等一段时间后就提示“连接被重置”</span></p>
<p class="MsoListParagraph" style="margin-left:38.85pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:0cm;text-align:center;"><span style="font-size:14px;"><a target="_blank" href="/content/plugins/kl_album/upload/201705/6d62acf234c9d62b3cc9e5f56e60533920170511111856430340817.jpg"><img src="/content/plugins/kl_album/upload/201705/6d62acf234c9d62b3cc9e5f56e60533920170511111856430340817.jpg" width="480" height="283" alt="点击查看原图" border="0" /></a><br />
</span></p>
<p class="MsoListParagraph" style="margin-left:38.85pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:0cm;text-align:center;"><a target="_blank" href="/content/plugins/kl_album/upload/201705/f600647b2ff06a135459a1e57ec3312f20170511111856447655867.jpg"><img src="/content/plugins/kl_album/upload/201705/f600647b2ff06a135459a1e57ec3312f20170511111856447655867.jpg" width="480" height="248" alt="点击查看原图" border="0" /></a></p>
<p style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0px;"></p>
<p style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0px;"></p>
<p class="MsoListParagraph" style="margin-left:38.85pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:-21pt;"><span lang="EN-US" style="font-family:Wingdings;">Ø<span style="font-stretch:normal;font-size:14px;line-height:normal;font-family:'Times New Roman';">&nbsp;&nbsp;</span></span><span style="font-size:14px;">办理业务</span><span lang="EN-US"><o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:21pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:21pt;"><span style="font-size:14px;">根据用户反馈，在填写完相应的表单后，单击“保存”后，需要十多秒才可以保存成功。</span></p>
<p style="margin-left:18pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:-18pt;"><span style="font-size:24px;"><span lang="EN-US">3.<span style="font-stretch:normal;line-height:normal;font-family:'Times New Roman';">&nbsp;&nbsp;&nbsp;&nbsp;</span></span>网络拓扑</span></p>
<p style="margin-left:18pt;font-size:12px;font-weight:normal;line-height:18px;text-align:center;text-indent:-18pt;"><span style="font-size:24px;"><a target="_blank" href="/content/plugins/kl_album/upload/201705/bd8f42d2c8d074e79a9428fc6c657d1620170511111856883903030.jpg"><img src="/content/plugins/kl_album/upload/201705/bd8f42d2c8d074e79a9428fc6c657d1620170511111856883903030.jpg" width="480" height="250" alt="点击查看原图" border="0" /></a><br />
</span></p>
<p style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0px;"></p>
<p class="MsoNormal" style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0px;"><span style="font-size:14px;">说明：</span><span lang="EN-US"><o:p></o:p></span></p>
<p class="MsoListParagraph" style="margin-left:38.85pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:-21pt;"><span lang="EN-US" style="font-size:14px;">1.<span style="font-stretch:normal;line-height:normal;font-family:'Times New Roman';">&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:14px;">负载均衡和防火墙物理上旁路部署，逻辑上串联。</span><span lang="EN-US"><o:p></o:p></span></p>
<p class="MsoListParagraph" style="margin-left:38.85pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:-21pt;"><span lang="EN-US" style="font-size:14px;">2.<span style="font-stretch:normal;line-height:normal;font-family:'Times New Roman';">&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:14px;">防火墙不仅做网络层的访问控制，同时启用</span><span lang="EN-US" style="font-size:14px;">WAF</span><span style="font-size:14px;">、</span><span lang="EN-US" style="font-size:14px;">IPS</span><span style="font-size:14px;">功能</span><span lang="EN-US"><o:p></o:p></span></p>
<p class="MsoListParagraph" style="margin-left:38.85pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:-21pt;"><span lang="EN-US" style="font-size:14px;">3.<span style="font-stretch:normal;line-height:normal;font-family:'Times New Roman';">&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:14px;">抓包设备对</span><span lang="EN-US" style="font-size:14px;">7609</span><span style="font-size:14px;">和</span><span lang="EN-US" style="font-size:14px;">6509</span><span style="font-size:14px;">上对相应流量做镜像</span><span lang="EN-US"><o:p></o:p></span></p>
<p class="MsoListParagraph" style="margin-left:38.85pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:-21pt;"><span lang="EN-US" style="font-size:14px;">4.<span style="font-stretch:normal;line-height:normal;font-family:'Times New Roman';">&nbsp;&nbsp;&nbsp;</span></span><span lang="EN-US" style="font-size:14px;">Web</span><span style="font-size:14px;">服务器做负载均衡，用户访问负载均衡虚地址，通过负载均衡后转换为访问实地址，真实服务器有两台</span><span lang="EN-US" style="font-size:14px;">10.0.102.10</span><span style="font-size:14px;">和</span><span lang="EN-US" style="font-size:14px;">10.0.102.11<o:p></o:p></span></p>
<p class="MsoListParagraph" style="margin-left:38.85pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:-21pt;"><span lang="EN-US" style="font-size:14px;">5.<span style="font-stretch:normal;line-height:normal;font-family:'Times New Roman';">&nbsp;&nbsp;&nbsp;</span></span><span style="font-size:14px;">客户端访问</span><span lang="EN-US" style="font-size:14px;">web</span><span style="font-size:14px;">服务时，首先经过</span><span lang="EN-US" style="font-size:14px;">7609</span><span style="font-size:14px;">到</span><span lang="EN-US" style="font-size:14px;">6509</span><span style="font-size:14px;">，然后到防火墙，由防火墙转发到负载均衡，负载均衡再转发到防火墙，然后防火墙转发到真实服务器</span><span lang="EN-US"><o:p></o:p></span></p>
<p class="MsoNormal" style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0px;"><span style="font-size:14px;">客户端到服务器的流量流逻辑相对较复杂，其数据流逻辑如下，其数据包返回时按原路返回：</span><span lang="EN-US"><o:p></o:p></span></p>
<p class="MsoNormal" align="center" style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0cm;text-align:center;"><a target="_blank" href="/content/plugins/kl_album/upload/201705/81c7540feb2b7637baaf6654819176d4201705111118571612662799.jpg"><img src="/content/plugins/kl_album/upload/201705/81c7540feb2b7637baaf6654819176d4201705111118571612662799.jpg" width="480" height="240" alt="点击查看原图" border="0" /></a></p>
</h1>
<h1 style="margin-left:18pt;text-indent:-18pt;"><span style="font-weight:normal;"><span lang="EN-US">4.<span style="font-stretch:normal;line-height:normal;font-family:'Times New Roman';">&nbsp;&nbsp;&nbsp;&nbsp;</span></span>故障分析</span><span lang="EN-US"><o:p></o:p></span></h1>
<h1 style="margin-left:18pt;text-indent:-18pt;"><p class="MsoNormal" style="margin-left:24.15pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:0px;"><span style="font-size:14px;">&nbsp;&nbsp;&nbsp;&nbsp;由于此故障是应用层面的故障，因此我们怀疑的重点在会对应用层数据包做处理的设备上。防火墙启用了</span><span lang="EN-US" style="font-size:14px;">WAF</span><span style="font-size:14px;">和</span><span lang="EN-US" style="font-size:14px;">IPS</span><span style="font-size:14px;">功能，其会对应用层数据包进行过滤，因此其作为怀疑的重点。同时，负载均衡作为代理设备，其负载算法可能会对正常连接造成影响。</span><span lang="EN-US"><o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:24.15pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:0px;"><span style="font-size:14px;">&nbsp;&nbsp;&nbsp;&nbsp;既然怀疑的重点在于防火墙和负载均衡上面，并且用户现场部署有相应的流量镜像设备。因此我们只需要将故障出现时的数据包下载下来分析即可。和用户沟通，其出现故障时间为</span><span lang="EN-US" style="font-size:14px;">8</span><span style="font-size:14px;">点</span><span lang="EN-US" style="font-size:14px;">50</span><span style="font-size:14px;">左右，客户端</span><span lang="EN-US" style="font-size:14px;">IP</span><span style="font-size:14px;">为</span><span lang="EN-US" style="font-size:14px;">10.40.44.199</span><span style="font-size:14px;">，根据用户描述，其在那段时间操作很卡，做个操作需要十多秒的时间。</span><span lang="EN-US"><o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:24.15pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:0px;"><span style="font-size:14px;">&nbsp;&nbsp;&nbsp;&nbsp;过滤相应时间与相应</span><span lang="EN-US" style="font-size:14px;">IP</span><span style="font-size:14px;">的数据包，找到相应的交互数据流。我们来分析交到的数据流。</span><span lang="EN-US"><o:p></o:p></span></p>
<p class="MsoListParagraph" style="margin-left:63pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:-21pt;"><span lang="EN-US" style="font-size:14px;">1.<span style="font-stretch:normal;line-height:normal;font-family:'Times New Roman';">&nbsp;&nbsp;&nbsp;</span></span><span lang="EN-US" style="font-size:14px;">10.40.44.199</span><span style="font-size:14px;">和</span><span lang="EN-US" style="font-size:14px;">10.0.1.10</span><span style="font-size:14px;">建立完三次握手后</span><span lang="EN-US" style="font-size:14px;">(</span><span style="font-size:14px;">因为抓包设备的原因导致数据包先看到</span><span lang="EN-US" style="font-size:14px;">SYN+ACK,</span><span style="font-size:14px;">序号为</span><span lang="EN-US" style="font-size:14px;">163084</span><span style="font-size:14px;">的包其实为</span><span lang="EN-US" style="font-size:14px;">ACK</span><span style="font-size:14px;">包</span><span lang="EN-US" style="font-size:14px;">)<o:p></o:p></span></p>
<p class="MsoListParagraph" style="margin-left:63pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:-21pt;"><span lang="EN-US" style="font-size:14px;">2.<span style="font-stretch:normal;line-height:normal;font-family:'Times New Roman';">&nbsp;&nbsp;&nbsp;</span></span><span lang="EN-US" style="font-size:14px;">10.40.44.199</span><span style="font-size:14px;">进行一个</span><span lang="EN-US" style="font-size:14px;">POST</span><span style="font-size:14px;">的保存操作，相应</span><span lang="EN-US" style="font-size:14px;">POST</span><span style="font-size:14px;">操作的</span><span lang="EN-US" style="font-size:14px;">URL</span><span style="font-size:14px;">为</span><span lang="EN-US" style="font-size:14px;">/TopIcis/EntLiaisonsRecordSave.do<o:p></o:p></span></p>
<p class="MsoNormal" align="center" style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0px;text-align:center;"><a target="_blank" href="/content/plugins/kl_album/upload/201705/2f4c591bd245ddf37a020532b686d9c7201705111118571879809531.jpg"><img src="/content/plugins/kl_album/upload/201705/2f4c591bd245ddf37a020532b686d9c7201705111118571879809531.jpg" width="480" height="116" alt="点击查看原图" border="0" /></a></p>
<p class="MsoListParagraph" style="margin-left:63pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:-21pt;"><span lang="EN-US" style="font-size:14px;">3.<span style="font-stretch:normal;line-height:normal;font-family:'Times New Roman';">&nbsp;&nbsp;&nbsp;</span></span><span lang="EN-US" style="font-size:14px;">10.0.1.10</span><span style="font-size:14px;">进行相应的</span><span lang="EN-US" style="font-size:14px;">ACK</span><span style="font-size:14px;">确认，然后</span><span lang="EN-US" style="font-size:14px;">10.0.1.10</span><span style="font-size:14px;">发送了一个</span><span lang="EN-US" style="font-size:14px;">Reset</span><span style="font-size:14px;">报文将连接释放了。</span></p>
<p class="MsoNormal" style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0px;"></p>
<p style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0px;"><span style="font-size:14px;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 是不是这个数据包的应用层数据触发了相应的安全策略，才会被</span><span lang="EN-US" style="font-size:14px;">reset</span><span style="font-size:14px;">异常释放掉？我们对其应用层内容进行分析，发现并没有攻击语句，基本上不会触发防火墙的</span><span lang="EN-US" style="font-size:14px;">WAF</span><span style="font-size:14px;">策略。</span></p>
<p style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0px;text-align:center;"><span style="font-size:14px;"><a target="_blank" href="/content/plugins/kl_album/upload/201705/242162c0c55f244fa8bd80cba920cf2620170511111857877588118.jpg"><img src="/content/plugins/kl_album/upload/201705/242162c0c55f244fa8bd80cba920cf2620170511111857877588118.jpg" width="469" height="360" alt="点击查看原图" border="0" /></a><br />
</span></p>
<p style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0px;"></p>
<p style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0px;"></p>
<p class="MsoNormal" style="margin-left:21pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:21pt;"><span style="font-size:14px;">既然没有触发相应的安全策略，为什么正常的请求还是被异常释放？肯定是某些机制在起作用或者说某些机制异常导致的。那么我们需要定位到是防火墙、服务器还是负载均衡设备发出的</span><span lang="EN-US" style="font-size:14px;">reset</span><span style="font-size:14px;">包。</span><span lang="EN-US"><o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:21pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:21pt;"><span style="font-size:14px;">由于抓包设备是对相关</span><span lang="EN-US" style="font-size:14px;">vlan</span><span style="font-size:14px;">的流量做镜像的，也就是说服务器、防火墙及负载均衡的数据包都被抓取到。</span><span lang="EN-US"><o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:21pt;font-size:12px;font-weight:normal;line-height:18px;text-indent:21pt;"><span style="font-size:14px;">直接分析数据包，可以看到其</span><span lang="EN-US" style="font-size:14px;">TTL=64,</span><span style="font-size:14px;">源</span><span lang="EN-US" style="font-size:14px;">IP</span><span style="font-size:14px;">为</span><span lang="EN-US" style="font-size:14px;">10.0.1.10</span><span style="font-size:14px;">，直接分析是负载均衡发送的</span><span lang="EN-US" style="font-size:14px;">reset</span><span style="font-size:14px;">数据包，但是负载均衡作为代理设备，服务器或防火墙发送的</span><span lang="EN-US" style="font-size:14px;">reset</span><span style="font-size:14px;">数据包转发到负载均衡时，其数据包层面的表象就是上面所看到的</span>。</p>
<p class="MsoNormal" style="margin-left:21pt;font-size:12px;font-weight:normal;line-height:18px;text-align:center;text-indent:21pt;"><a target="_blank" href="/content/plugins/kl_album/upload/201705/110c4f5e646dbb4658631bc49d507f7c201705111118571960684587.jpg"><img src="/content/plugins/kl_album/upload/201705/110c4f5e646dbb4658631bc49d507f7c201705111118571960684587.jpg" width="480" height="189" alt="点击查看原图" border="0" /></a></p>
<p style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0px;"></p>
<p class="MsoNormal" style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0cm;"><span lang="EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="font-size:14px;">因为我们需要分析这个数据是不是服务器或者防火墙发出的？防火墙工作为路由模式，如果是防火墙或服务器发出的</span><span lang="EN-US" style="font-size:14px;">reset</span><span style="font-size:14px;">数据包，那么我们直接通过下面过滤表达式即可过滤出来：</span><span lang="EN-US"><o:p></o:p></span></p>
<p class="MsoNormal" style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0cm;"><span lang="EN-US" style="font-size:14px;line-height:21px;">(ip.src == 10.0.102.10 or ip.src == 10.0.102.11) and tcp.flags.reset == 1<o:p></o:p></span></p>
<p class="MsoNormal" style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0cm;"><span lang="EN-US" style="font-size:14px;line-height:21px;">&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="font-size:14px;line-height:21px;">直接过滤，果然发现<span lang="EN-US">10.0.102.11</span>发送了一个<span lang="EN-US">reset</span>包，难道是防火墙或者服务器发起的？仔细分析了一下时间，上个报文的时间为<span lang="EN-US">08:51:02</span>秒，而这个报文的时间为<span lang="EN-US">08:50:53</span>秒，<span lang="EN-US">reset</span>包作为传输层的一个标识数据包，中间设备转发时肯定不会产生这么大的延迟，因此，个人推断这个数据包肯定不是这个会话的。因此发送这个<span lang="EN-US">reset</span>包的正是负载均衡设备本身。</span></p>
<p class="MsoNormal" style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0cm;text-align:center;"><span style="font-size:14px;line-height:21px;"><a target="_blank" href="/content/plugins/kl_album/upload/201705/e2268252a8dc2bc70d55e37f1f4f787b201705111118581770575873.jpg"><img src="/content/plugins/kl_album/upload/201705/e2268252a8dc2bc70d55e37f1f4f787b201705111118581770575873.jpg" width="480" height="269" alt="点击查看原图" border="0" /></a><br />
</span></p>
<p style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0px;"></p>
<p class="MsoNormal" style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0cm;"><span lang="EN-US" style="font-size:11pt;line-height:22px;">&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="font-size:14px;line-height:21px;">分析至此，已定位到是负载均衡发起的<span lang="EN-US">reset</span>报文将该连接释放导致的。但是，这个结论与用户描述的现象并不吻合<span lang="EN-US">:</span>进行保存操作时比较卡，需要十多秒才可以保存成功。上面我们分析的是负载均衡把连接释放了。如果这样的话，用户的现象应该是连接中断才对。<span lang="EN-US"><o:p></o:p></span></span></p>
<p class="MsoNormal" style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0cm;"><span lang="EN-US" style="font-size:14px;line-height:21px;">&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="font-size:14px;line-height:21px;">如果是这样的话，客户端肯定会存在重传的数据包，我们直接对应用层的数据进行过滤，果然发起客户端在<span lang="EN-US">11</span>秒后进行了重传操作。</span></p>
<p class="MsoNormal" style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0cm;text-align:center;"><span style="font-size:14px;line-height:21px;"><a target="_blank" href="/content/plugins/kl_album/upload/201705/d60914d394f54835d476033985b4a742201705111118582003779285.jpg"><img src="/content/plugins/kl_album/upload/201705/d60914d394f54835d476033985b4a742201705111118582003779285.jpg" width="480" height="238" alt="点击查看原图" border="0" /></a><br />
</span></p>
<p style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0px;"></p>
<p class="MsoNormal" style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0cm;"><span lang="EN-US" style="font-size:11pt;line-height:22px;">&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="font-size:14px;line-height:21px;">重传相应的保存操作报文后，服务器正常响应。</span></p>
<p class="MsoNormal" style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0cm;text-align:center;"><span style="font-size:14px;line-height:21px;"><a target="_blank" href="/content/plugins/kl_album/upload/201705/039b4c0bec9d3adfb266345ee81e393820170511111858934387717.jpg"><img src="/content/plugins/kl_album/upload/201705/039b4c0bec9d3adfb266345ee81e393820170511111858934387717.jpg" width="480" height="145" alt="点击查看原图" border="0" /></a><br />
</span></p>
<p style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0px;"></p>
<p class="MsoNormal" style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0cm;"><span lang="EN-US" style="font-size:11pt;line-height:22px;">&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="font-size:14px;line-height:21px;">至此，对这次性能慢的分析已形成闭环。用户保存卡的原因为：客户端在向服务器进行保存操作时，被负载均衡异常释放掉；然后客户端在<span lang="EN-US">11</span>秒后再次请求，服务器正常响应，负载均衡正常转发。<span lang="EN-US"><o:p></o:p></span></span></p>
<p class="MsoNormal" style="font-size:12px;font-weight:normal;line-height:18px;text-indent:0cm;"><span lang="EN-US" style="font-size:14px;line-height:21px;">&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="font-size:14px;line-height:21px;">关于负载均衡为什么将上一个<span lang="EN-US">post</span>报文丢弃并发送<span lang="EN-US">reset</span>报文不作为此次分析的重点，感兴趣的小伙伴可以私下讨论。</span></p>
</h1>
<h1 style="margin-left:18.0pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1;">
</h1>
<p class="MsoNormal" style="text-indent:0cm;"><span lang="EN-US"><v:shape id="图片_x0020_11" o:spid="_x0000_i1027" type="#_x0000_t75" style="width:414.75pt;height:231.75pt;visibility:visible;mso-wrap-style:square;"><v:imagedata src="file:///C:\Users\ADMINI~1\AppData\Local\Temp\msohtmlclip1\01\clip_image015.png" o:title=""></v:imagedata></v:shape></span></p>
<p class="MsoNormal" style="text-indent:0cm;"><span lang="EN-US"><v:shape id="图片_x0020_13" o:spid="_x0000_i1026" type="#_x0000_t75" style="width:415.5pt;height:205.5pt;visibility:visible;mso-wrap-style:square;"><v:imagedata src="file:///C:\Users\ADMINI~1\AppData\Local\Temp\msohtmlclip1\01\clip_image017.png" o:title=""></v:imagedata></v:shape></span></p>
<p class="MsoNormal" style="text-indent:0cm;"><span lang="EN-US"><v:shape id="图片_x0020_16" o:spid="_x0000_i1025" type="#_x0000_t75" style="width:414.75pt;height:124.5pt;visibility:visible;mso-wrap-style:square;"><v:imagedata src="file:///C:\Users\ADMINI~1\AppData\Local\Temp\msohtmlclip1\01\clip_image019.png" o:title=""></v:imagedata></v:shape></span></p> <a href="http://www.vants.org/?post=279">阅读全文&gt;&gt;</a><div id="related_log" style="font-size:12px"><p><b>相关日志：</b></p><p><a href="http://www.vants.org/?post=198">更换设备后业务访问故障案例</a></p><p><a href="http://www.vants.org/?post=285">MOTS攻击之TCP攻击</a></p><p><a href="http://www.vants.org/?post=289">某省厅门户网站A市局访问异常应急处置</a></p><p><a href="http://www.vants.org/?post=281">MOTS攻击技术分析</a></p><p><a href="http://www.vants.org/?post=183">Netscout 的KFP分析方法论</a></p></div>]]></description>
	<pubDate>Fri, 21 Apr 2017 07:59:01 +0000</pubDate>
	<author>飞鸟</author>
	<guid>http://www.vants.org/?post=279</guid>

</item></channel>
</rss>