387 posts categorized "Tony Fortunato" Feed

Upcoming LMTV Event on How to Improve Compliance Activities for IT

Upcoming LMTV Event on How to Improve Compliance Activities for IT

There is a new LMTV event happening on April 11, 2018. Keith Bromley from Keysight Technologies (formerly Ixia) and Wayne Dixon from ForeScout will be talking about how to use network visibility to improve regulatory compliance. While regulatory compliance is an important activity for medium to large businesses, easy and cost-effective solutions can be difficult to find.

Network visibility is an often overlooked, but critically important activity, that can help lower costs and make life easier for IT personnel working on compliance requirements. Solutions like network packet brokers (NPBs) allow you mask sensitive data, perform packet slicing, implement lawful intercept, and discover rogue IT. Purpose-built compliance solutions can also use data filtered by NPBs to perform activities better and also allow IT to demonstrate their regulatory compliance in an easy manner.

Some key thoughts we will discuss during the event:

  • A Visibility Architecture is an end-to-end infrastructure which enables physical and virtual network, application, and security visibility. Instead of just adding components as you need them at sporadic intervals (i.e. crisis points), step back and take a larger view of where you are and what you want to achieve.
  • There are at least four specific areas where NPBs can help compliance activities for network monitoring to:
  • Provide masking of sensitive data. This includes data masking for one or more digits so that security and monitoring tools downstream don’t receive clear text data.
  • Remove the data packet payload with packet trimming. When packet header information is all you need, packet slicing allows you to eliminate the propagation of unnecessary and dangerous data within the payload of the packet.
  • Perform lawful intercept of data from specified IP addresses and VLANs.
  • Create regular expression search strings using application intelligence to enable better searches for specific data
  • There are at least two additional areas where NPBs can help a security architecture to:
  • Discover rogue IT (unauthorized applications and devices), which helps avoid policy and compliance issues.
  • Enforce IT policies, like detecting off-network storage and unapproved web-based email solutions, to identify exfiltration of data potential security risks.
  • Data from NPBs can also be fed to purpose-built compliance solutions like the ForeScout CounterACT solution to support demonstration of regulatory and endpoint compliance.

Join us for the fourth of several discussions to learn how to unleash the power of network visibility.

If you can’t make it to the event, watch the podcast on-demand or check out some of these free resources.

 

 


Wireshark Udemy Free Course Giveaway (by Tony Fortunato)


I have been presenting, training, creating videos, articles and sharing information for over 20 years. As technology evolves, I have tried to keep up by creating lovemytool google and linkedin groups as well as contributing to many social media technical groups/online publications.

When youtube started becoming a source of information for technicians, i created a channel. My youtube channel has over 330 videos covering various topics such as Microsoft operating system, Cisco, Wireless, Wireshark and other technical topics.

I will not be teaching or presenting this year (so far) so i thought i would take some of the suggestions sent to me last year. I had several requests to create some online material so I created a "Wireshark 2 Fundamentals" class on Udemy as my first attempt. This is introductory class for those who want to start using Wireshark or if you need a refresher.

No need to be intimidated by Wireshark! Many IT analysts avoid getting into Wireshark because it seems overwhelming.  You don't need a lot of experience to get up and running with Wireshark. In this course you will learn all the basics required to confidently capture, save and navigate around Wireshark's environment. I will spend some time explaining enough of the software to encourage you to use it more.

Continue reading "Wireshark Udemy Free Course Giveaway (by Tony Fortunato)" »


Figuring Out Where To Slice a Packet Using Wireshark (by Tony Fortunato)

There are many scenarios with packet slicing is helpful and possible necessary.  I covered this in a previous article Network Protocol Analysis Tip: Packet Slicing (http://tinyurl.com/yb38lw9j).

To summarize, here are some examples or scenarios where you should consider packet slicing:

  • The data is not useful or unreadable/encrypted
  • To conserve disk space or reduce your trace file size
  • Legal issues around the payload of captured packets
  • Reduce load on your capture device. Some packet capture tools are less likely to drop packets when packets are sliced.

David K, one of my YouTube subscribers, asked a great question, “… How could one do that? …”. I thought what a great question since there are times when I assume the reader knows how to do this.

In this video I cover how to figure out the packet slicing value for a HTTP GET command and the destination MAC address.  From these two examples, the reader should be able to calculate any other packet slice value.

Please keep in mind that you should always go through this process to determine the packet slice value or offset. This offset may change depending on the network or application so don’t assume the packet slice value will remain the same.

 

 

Continue reading other LoveMyTool posts by Tony Fortunato »


Wireshark Capture Interface Issue (by Tony Fortunato)

When I first started my website I had a whole section on product ‘issues’ or ‘bugs’.

My intent was to help my clients, subscribers, while reducing the number of emails I get about these issues.  Over the years, I found it to be too much work to maintain since I introduced more tools to my website.

In the past 2 years, I have eliminated almost all vendor specific tool webpages from my site that contained tips, tricks and bugs.

Wireshark is still one of the primary tools I use in the field and still do private training or presentations with it, so I thought I would keep that section on my website.

In this video I explain an issue I ran into recently with the default capture interface setting. The purpose of the video is to document the issue and help anyone who may encounter this issue.

Let me know if you find this helpful and I will create more along with my usual tips and tricks.

 

 

 

Continue reading other LoveMyTool posts by Tony Fortunato »


Capture Packets With Microsoft’s netsh (by Tony Fortunato)

There are many challenges we face when I want to capture packets while troubleshooting.  

  • Installing a packet capture tool such as Microsoft’s Netmon or Wireshark, might be a deal breaker for some admins.
  • Using a span or mirror port might not be available or add excessive latency to packets.

In most cases I would be happy with a solution that simply captures the packets and I can analyze the data on another system.

Many analysts I speak to are not aware that most Microsoft operating systems allow you to capture packets without installing anything on it.  The command is netsh trace start etc… 

In this video I show you how to get started by capturing data and making the trace compatible for Wireshark.

 

 

Continue reading other LoveMyTool posts by Tony Fortunato »