394 posts categorized "Tony Fortunato" Feed

Managing Wireshark Packet Comments (by Tony Fortunato)

In my opinion, Wireshark's File and Packet comments are the most under utilized features.

When I work onsite and capture packets, I get a lot of questions ranging from tool use and of course, packet interpretation.

Other than providing some customized onsite training (I no longer offer public training sessions) or mentoring, knowledge transfer is always challenging.

Providing file comments helps document why and where you performed the trace and any other noteworthy points. Notes such as a problem description, if SPAN or TAP are used are incredibly helpful when others look at the trace file.

Packet comments are even more important since you can explain protocol, application behavior and problems within the related packets.

It doesn't matter if the notes are to jog your memory 6 months from now or if you are sending the trace to another department/vendor.  Anyone will find the comments helpful reducing a lot of the typical back and forth involved when you share a trace file.

In this video I cover how to add, find and remove packet comments.

 

 

Continue reading other LoveMyTool posts by Tony Fortunato »


IP Subnet Wireshark Display Filter (by Tony Fortunato)

When asked for advice on how to be a proficient protocol analyst, I give 2 pieces of advice;

  1. Practice looking for patterns. In most cases, you are looking for patterns, or a break in the pattern.  Don’t worry about memorizing the RFC’s or learning about every protocol. It is easier to focus on whatever protocol you are working on at that time.
  2. Learn your display filters in whatever your protocol analyzer you use. The correct display filter will make the patterns jump out at you.

I caution analysts about going capture filter crazy. Unless you know exactly what you are capturing, I typically try to leave the capture filter as ‘open’ as possible. My concern when troubleshooting is that due to the very nature of the unknowns when troubleshooting, you may inadvertently filter out valuable packets.

I great example is you may decide to use a capture filter for a web server ip address when capturing from the client. In this scenario you would miss any packets from the router or other devices along the way if they send the client an ICMP error packet or if the client communicates with other servers.

In this example, I show you that the ip.addr display filter can be used for a subnet.  You are probably familiar with this filter when filtering on a single device. What do you do if you need to filter on more than one host? The typical approach is to combine the ip.addr filter with an or. For example ip.addr==192.168.1.1 or ip.addr== 192.168.1.2 is one way to capture from two hosts.

  

 

Continue reading "IP Subnet Wireshark Display Filter (by Tony Fortunato)" »


The Bootup Baseline (by Tony Fortunato)

Since 1995, I have been promoting the idea of a “Bootup Baseline”. The exercise is very straightforward, you power on a device and capture all the packets generated.

I want to take a moment to explain what we will not cover. As you look at the packets you will see several types of traffic:

  • Unicast to the bootup device. This is what we want to focus on
  • Broadcast or Multicast from other hosts. We will ignore these for the most part.
  • Flooded traffic. These are unicast packets that are addressed to other hosts that are on your switch port. This is good to note and possibly take aside to determine why it is happening and of its ‘normal’.

The traffic gathered is there for only two reasons; either the host transmitted them, or the devices on the network sent them back to the booting host.

The most important step in this process is to document how you captured the data. There are many ways to capture packets from a booting device, but the most popular are:

  • SPAN or port mirroring. Since we are not concerned with capturing errors or timings, this works well. The most convenient if you have proper access to the switch.
  • In my opinion this is the best way but it requires you to be physically close to the device and you have to break the connection to that device.
  • 10/100 Hub serves the same purpose as a TAP but no full duplex, fibre or 1 Gb support. We are only interested in the details of the traffic and not timings this works in a pinch. Ensure that the switch port connected to the hub is properly configured to support half duplex.

Continue reading "The Bootup Baseline (by Tony Fortunato)" »


LMTV LIVE | How to Improve Compliance Activities for IT (with Keith Bromley and Timothy Jones)

Upcoming LMTV Event on How to Improve Compliance Activities for IT

 

There is a new LMTV event happening on April 11, 2018. Keith Bromley from Keysight Technologies (formerly Ixia) and Wayne Dixon from ForeScout will be talking about how to use network visibility to improve regulatory compliance. While regulatory compliance is an important activity for medium to large businesses, easy and cost-effective solutions can be difficult to find.

Network visibility is an often overlooked, but critically important activity, that can help lower costs and make life easier for IT personnel working on compliance requirements. Solutions like network packet brokers (NPBs) allow you mask sensitive data, perform packet slicing, implement lawful intercept, and discover rogue IT. Purpose-built compliance solutions can also use data filtered by NPBs to perform activities better and also allow IT to demonstrate their regulatory compliance in an easy manner.

Continue reading "LMTV LIVE | How to Improve Compliance Activities for IT (with Keith Bromley and Timothy Jones)" »


LMTV LIVE | Meet the Ekahau Geeks (with Tony Fortunato and Tim O'Neil)

 

Join Tony Fortunato and Tim O'Neill Wednesday April 4 at 9:30 Eastern as they interview the geeks from Ekahau (https://www.ekahau.com).

Jerry Olla, Jussi Kiviniemi and Joel Crane will be discussing WiFi tools and common Wifi issues that they see out there. Why is Wi-Fi often so bad? What can we do about it? What does bad, and good Wi-Fi look like?

We will also see live demos of their brand-new Wi-Fi design and troubleshooting hardware and software tools.

As Tim O’Neil says, “WiFi is now an essential part of your corporate network infrastructure! Learn from experts on how to monitor, manage and secure.”

Ekahau upcoming event 
Cisco-Geekfest-2018-logo_400x400-146x146

2018 Cisco Geekfest

May 8th - 10th, 2018
Chicago, IL