October 31, 2019

Empower your analysis teams with capture profile management!

 Title: Webinar - Empower your analysis teams with capture profile management


Overview -

CloudShark capture profiles are one of the most powerful ways to tailor your analysis view, significantly decreasing the time it takes to solve problems. Your column choices, decode rules, and decryption settings all apply towards making your job easier. In CloudShark 3.7, the new profile manager not only lets you fine-tune your own work, but revolutionizes how your team works with captures - building a curated base of expert profiles that evolves over time and helping all of your analysts and engineers.

Join Tom for a special webinar highlighting profile management in CloudShark.

He’ll show you:

  • How profiles work in CloudShark

  • Best practices for using them in analysis

  • How the profile manager lets you share them with groups

  • How create organization-wide profiles unique to your analysis issue


Tom Peterson works at CloudShark helping bring pcap analysis to the web. Getting started with networking at 2005 performing testing at the InterOperability Lab at UNH he began by learning IPv6 and moved from there testing IPsec, firewalls, and other network security devices. Testing a variety of protocols and devices has led to a passion of looking for strange behavior in a pcap file and getting to the bottom of it.


October 15, 2019

Best If Used By 12-25-1995 (by Paul W. Smith)

 

When you consider the dreadful truth about food poisoning, you would expect a government-mandate for labeling the stuff we eat. There isn’t one. The FDA does require that baby formula have a “Use by…” date, but once you’re off the bottle, you’re on your own.

The lack of a legal requirement hasn’t kept food manufacturers from dating their products, but the systems they use, and the motives behind them, have only created confusion. If I purchase a can of tuna the day before the “Sell By” date, is it safe to eat for another day, or another month? “Best If Used By” feels like a suggestion related to quality, while “Use By” sounds like an imperative with dire and yet ambiguous consequences. Some of us fear health dangers lurk if we don’t adhere strictly to these dates. Others suspect that dates are a ploy by manufacturers to get us to feed their bottom line instead of ourselves. The FDA has only one thing to say about this – “use common sense” – which unfortunately isn’t all that common.

There is more to food than just avoiding sickness and everyone benefits when food items are consumed at their peak of flavor and nutrition. Retailers will customarily discard products by whatever date is on them, effectively putting the burden on the consumer. Those of us who throw things out once they pass that printed date might feel smugly safe from sickness, but how do you know the yogurt that doesn’t “expire” until next week didn’t sit on a loading dock at 110 deg for 5 hours before arriving at your local market?

October 14, 2019

The power of the command line - Using Microsoft netsh


The power of the command line - Using Microsoft’s netsh

Note: I just tested, and this still works in windows 11 

I always encourage technical staff to get comfortable at the command line. This is for a lot of reasons: 

  • More efficient than a gui  
  • Learn about the device operation  
  • Many times you can get information not available in the gui  
  • A lot faster when working remotely over slow links  
  • You can script common tasks 

A great example is when teaching Wireshark, I spend time on tshark/dumpcap at the command line.

In this article I will spend some time on Microsoft’s netsh that I use regularly to modify my IPv4 settings. The reason is quite simple, if I have to make the same change multiple times, it is far more efficient to do it at the command line or in a batch file rather than navigate through 4 or 5 menus/screens.


Referencing the examples provided in the video, you can easily create a batch file that will accept input instead of statically assigning values. Here is a summary of the commands in the video:
Display usage options and syntax netsh /? List of adapters netsh interface ipv4 show interfaces netsh interface ipv4 show config netsh interface ipv4 show address Show IPV4 global info netsh interface ipv4 show global To disable my Ethernet adapter labeled Killer netsh int set int name=“Killer" admin=disabled To enable my Ethernet adapter labeled Killer netsh int set int name=“Killer" admin=enabled Display TCP or UDP connections netsh interface ipv4 show tcpconnections netsh interface ipv4 show udpconnections Set a static IP Address (10.44.10.22), Subnet Mask (255.255.255.0) and Gateway (10.44.10.1) on a specific interface (Killer) permanently (persistent) Use “” around your interface name if it has spaces in it. netsh interface ipv4 set address name=Killer static 10.44.10.22 255.255.255.0 10.44.10.1 store=persistent Set DNS Servers without a DNS check, the set dnsservers command supports only one server as argument netsh interface ipv4 set dnsservers name=Killer source=static “8.8.8.8" primary Set your adapter IPV4 and DSN back to DHCP netsh interface ipv4 set address name=Killer source=dhcp netsh interface ipv4 set dnsservers name=Killer source=dhcp Enjoy



The integration of artificial intelligence (AI) into the operational frameworks of cybercriminals has accelerated at an unprecedented rate, creating a more dangerous and accessible threat landscape.

Artificial Intelligence Transforms Cybercrime


October 08, 2019

Keep your Eyes Open

 

Keep your Eyes Open

In this little write-up, I wanted to share my latest experience at a customer site.

As part of troubleshooting, I always suggest we ‘clean-up’ and refresh or validate their documentation. I can’t remember how many times this simple exercise resulted in actually ‘fixing’ the problem. I love watching the look of confusion in the customer’s face as they mutter, “that’s not supposed to be connected to that”, “this was supposed to be decommissioned a long time ago”, or the ever popular, “who plugged this in?”.

Label, label, who’s got the label

In this case, I noticed some switches had labels indicating the IP address of the switch. Great, a label, not a common site, and I was impressed. The odd thing about the label was that I noticed it wasn’t within their addressing range. I asked if they had a management VLAN with a different IP addressing scheme, to which the customer replied, “yes”. When I probed a bit deeper and queried if the address on the label was within the Management VLAN addressing, the answer was, No.” Of course the IP address on the label was not reachable, nor within the customer’s addressing ranges.

One of the technicians recognized the IP address and said that the IP range was the LAB subnet. It seems that the LAB technicians labeled everything when they were testing and configuring the switches, but the labels were never physically removed when the equipment was deployed to the production environment. Not a big deal if you work there, but very confusing for contractors like me.


Passwords

This one is becoming my favourite; as I worked towards cleaning up the computer room, I noticed this curled up label on the core switch and similar labels on other equipment. Can you guess what the labels were? Hold on to your socks, it was the telnet/enable password of the equipment. AND THEY WORKED!!!! When I asked the customer why they thought this was a good idea, they said this was done because the analysts kept forgetting the passwords, so it was easier to put them on a label. He added that since the computer room has restricted access, having the passwords written on the labels posed no security risk.


This next part is so crazy, its believable. I telnetted into the switch and this was the banner configuration;

The telnet and enable password was part of the switch banner configuration. Hmmmmmmmmmmmmm…. It seems this is common practice in the lab but someone forgot to remove that part of the switch configuration when it was put into production. Of course everyone thought someone else would review or clean up the configuration.


The moral of the story is to keep your eyes open and review configurations every so often.



sponsor


Popular post in the past 30 days