Unleashing Wireshark’s Powerful Follow TCP Stream Feature
Feb 21,
2017
In security courses such as Learning Tree’s System and Network Security Introduction, we often hear about the insecurity of protocols such as Telnet. These older protocols send their data – including login credentials – over the network in the clear. While ssh, a secure alternative to Telnet, is used in many applications today, many sites […]
How Many Linux Systems Do You Use? Don’t Answer Too Quickly
Jan 26,
2016
“Linux? Where you have to type everything and it’s all a bunch of cryptic nonsense like this? ls -laRF | less I don’t use it, I never would!” Don’t answer so fast. While Linux runs 97% of the top 500 supercomputers in the world, it runs on many devices you encounter in everyday life. And it’s not just […]
Wireshark and Giving Back to the Open Source Community
Dec 15,
2014
I am a contributor to Wireshark. OK, it’s been a while since I contributed, but I did make two useful contributions and I plan on doing more in the future. I am surely not one of the “top ten” or even “top thirty” contributors. Others have done far more than I have, However, I’d like […]
Wireshark as a Security Tool – Part 2
Nov 28,
2014
In A Brief Introduction to Wireshark as a Security Tool I showed a few features of Wireshark that might be useful for the security administrator. In this next installment we will look at some more Wireshark features. One of the tools Wireshark has is the ability to look at wireless management and control frames (although […]
A Brief Introduction to Wireshark as a Security Tool
Nov 5,
2014
Wireshark is an open source protocol analyzer. It is “free” and runs on most platforms. Wireshark is a valuable tool for web programming, network troubleshooting and analyzing security issues. In this post we’ll look at a simple way to capture data and look at HTTP’s “Basic Authentication”. I’ll dive Windows instructions, but the operation is […]