« July 2018 | Main | September 2018 »

12 posts from August 2018

Detecting SYN Flood Attacks with Colasoft Capsa (by Jack Wei)

Detecting SYN Flood Attacks with Colasoft Capsa!

 Denial-of-service attack (DoS attack) is a malicious attack to make a machine or network resource unavailable to users, usually by temporarily or indefinitely disrupting services of a host connected to the Internet. (US-CERT 2013)

Today, DoS attack is a common cyber-attack on the network. According to the statistics, every three seconds, there is a DoS attack happening on the Internet. The low cost of launching a DoS attack is one of the major causes of frequent DoS attacks.

Some of the most commonly used DoS attack types include:

Ping of Death, Teardrop, WinNuk, UDP flood, TCP SYN flood, IP Spoofing, Land Attack, Smurf, ICMP flood, etc.

In this article, we will show you how to detect SYN flood attacks using a network analyzer named Colasoft Capsa.

You can download some awesome tools here - Including the Freeware Capsa - 

Free Tool Download, including Capsa free - Click Here!

In order to analyze DoS attacks (and Others) , I suggest you follow the three steps below:

  1. Observation

Most hosts which are under DoS attack will show high CPU and memory usage or the network bandwidth is occupied by garbage traffic.

  1. Analysis

We can analyze and locate the attacks by decoding the raw packets. In this way, we will get protocols and behaviors of packets. Compare these information with attack signature, then we can locate the actual attack type.

  1. Locate issues

With TCP/UDP session and chart function, we can more accurately and quickly locate DOS attacks.

Now, I will give you an example to show you the detailed steps using the visual capabilities of Capsa!.


Continue reading "Detecting SYN Flood Attacks with Colasoft Capsa (by Jack Wei)" »

Create Marketing Material That Make an Impact on your site(by John Gumas)


Having boring marketing materials is a great way to not get noticed. And of course, that’s exactly what you don’t want. In order to grow your business, you need to make sure you’re doing everything you can to grab the attention of your customers. From informational flyers to social media graphics, it’s important to create marketing materials that make an impact. Here’s how to get started.

  • Develop Your Message. Your marketing materials should be focused on how you can help your customers and make their life easier. Tailor your product or service to how it can solve a problem, and get to the point quickly. Plus, don’t forget to explain who you are and why they should buy from you over your competitors.
  • Know Your Audience. How can you create effective marketing materials if you don’t know who will be seeing them? A big part of marketing is understanding people. Get to know the ins and outs of your customer base, including what they might be feeling when consuming one of your ads. By appealing to the desires of your customer, you’ll have a much easier time communicating your message.
  • Tell a Story. The secret to capturing the attention of your audience is to tell a story. Storytelling is an essence, not a type of writing. Find a way to hook your audience and tell them something they don’t know. A good place to start is to be relatable and show vulnerability. Did your company start from nothing? Share this with your audience. When executed properly, a heartfelt story can be extremely effective.
  • Think Outside the Box. It’s all too easy to fall into the habit of following trends. Sometimes, though, the best action to take is the one that nobody else has considered. For instance, in this world of digital advertising and instant communication, nothing stands out like a physical catalog or a direct mail letter. Your research should give you a pretty good idea of what will work with your audience. Use this knowledge to your advantage. Be creative, and have fun!

Making an impact with your marketing materials is a challenge, but it’s easier than it seems. The combination of concrete data and a good eye for innovative marketing will take you a long way.

If you would like some assistance improving your website’s conversion rate, please drop us a line at: editor@gumas.com

John GumasAuthor - This article was written by John and Team - John Gumas is the Founder and President of Gumas Advertising, a San Francisco based full service branding, advertising and interactive marketing agency that specializes in Challenger Brand Marketing. John is considered one of the country’s foremost authorities on Challenger Brand Marketing and is the author of the popular book on the subject entitled “Marketing Smart.”

Check out John’s book at www.marketingsmartbook.com/

*Editor's Note - The Oldcommguy - John is an awesome friend and a very seasoned professional marketing expert. I have had the pleasure of working with John and Team and if you need Branding and/or Marketing assistance the Gumas Team is the Very Best Team and I highly recommend them!

Read some more of John's Articles on Challenger Brands! - 






Searching for a Protocol Solution to Phishing (by Nalini Elkins)

Searching for a Protocol Solution to Phishing


Phishing and other social engineering attacks are a large problem for enterprises.   You may wish to look at WikiPedia for the data breach at the Office of Personnel Management (OPM) at https://en.wikipedia.org/wiki/Office_of_Personnel_Management_data_breach.  This breach released personal information including the names, addresses, and social security numbers of millions of  federal employees and contractors.   The breach was most likely a result of a successful social engineering attack.

Yet, we are at the very beginning of what might happen.  We may look back on these days as the days of innocence.   Today, when you get a phishing email from someone telling you that you have won millions of dollars in a lottery that you never entered or a request from someone in a distant country to help them with their inheritance, you laugh (or grimace) and wonder why the spam blocker is not working.

Things are changing - 

Continue reading "Searching for a Protocol Solution to Phishing (by Nalini Elkins)" »

Which is Better for Troubleshooting SaaS Performance Issues: Packet or Number Crunching? (by Will Moonen)

  • Which is Better for Troubleshooting SaaS Performance Issues: Packet or Number Crunching?

 Most enterprise IT professionals and network performance management (NPM) tool vendors consider it mandatory to have the original packets for analysis when solving difficult network and application degradation issues. That’s because visibility into network, TCP transport, and application performance is essential, especially when web, SaaS applications, and hybrid cloud infrastructure are involved.

While there are certainly cases where you need the original packets,  there may be cases where sifting through large volumes of packets would impair rapid problem isolation and resolution time.

That is why it is our contention, and based on real customer scenarios, that insights offered by automated “number crunching” wire-data analytics trumps terabytes of stored packets.

Let’s examine further. Figure 1: FastestMTTR-01
Achieving fast MTTR in complex IT environments: Number vs. packet crunching?

 Handling slow cloud applications - 

Here’s a situation we encountered at one client that had a large number of branch offices.  Users at many branch offices reported slow application performance, mostly around three cloud applications.  From initial analysis, we discovered that the performance degradations occurred between 7 and 11 AM  and every three to five working days.


Continue reading "Which is Better for Troubleshooting SaaS Performance Issues: Packet or Number Crunching? (by Will Moonen)" »

Sharkfest 2018 - TCP Fundamentals Part 1 (by Chris Greer)

TCP is a huge component of the reliable delivery of applications. You are using it at this moment to access and read this article. You are probably using it to deliver most - if not all - of your business critical services on your network. 

But how does TCP "do it's thing?"

Why is the network often blamed even when a TCP-based problem is the real culprit? 

Understanding how TCP works will help network engineers of all experience levels to be better troubleshooters. It will help them fix slow networks, identify the root cause of application issues, and finally get answers to perplexing performance questions. This video, recorded at Sharkfest USA 2018 in Mountain View, California, gives an overview of the fundamentals of TCP. 

Sit back, grab some popcorn, and copy of Wireshark. Let's learn more about TCP! 


Author Profile - Chris Greer is the Chief Packet Head for Packet Pioneer LLC and a Certified Wireshark Network Analyst. Chris regularly assists companies in tracking down the source of network and application performance problems using a variety of protocol analysis and monitoring tools including Wireshark. Chris also delivers training and develops technical content for Wireshark and for several analysis vendors. Got packet questions? Let's get in touch!

Chris Greer Packet Pioneer Logo