(Content not available)
Writings, case studies, pioneer profiles, and technical guides from four decades on the wire.
Packet-level detail. Operational results. Real engagements where truth was disputed.
Restoring communications at the Pentagon within days of 9/11. Reverse-engineering undocumented networks, cross-silo collaboration, and the creation of the Rapid Network Rendering Database.
Read ArticleTCP sequence graph analysis exposes an internal MITM device killing high-stakes file transfers. Linux IPTABLES firewall unmasked through incongruent hop counts and IP Fragment IDs.
Read Article
Setting up DVWA for hands-on security testing. Command injection, SQL injection, XSS, and more in a safe virtualized environment.
Read Article
How ERSPAN enables remote network traffic capture through GRE tunnels. Real-time packet monitoring across Cisco, VMware, and Linux platforms.
Read Article
ERSPAN implementation on Cisco 9K switches during a live Wireshark Wednesday session. GRE tunnel setup and real-time packet capture for incident response.
Read Article
Retrospective network analysis identifies 655 compromised SSL certificates within minutes — saving 120 hours and reducing breach risk by 90%.
Read Article
Recurring help desk tickets traced to root cause through on-the-wire analysis.
Read Article
[F]ortune 100 Company has serious Citrix issues affecting over 22,000 users regularly. Our Remote Diagnosis service was exactly what they needed to uncover the technical causes of
Read Article
[A]fter spending $600,000.00 on server CPU upgrade that did not improve response time, this company found the real problem they were trying to resolve. [W]e helped them diagnose th
Read Article
[G]lobal 2000 Company receives 10x Application Throughput after diagnosing problem with Onsite Analysis. This organization received great reward for not one dollar of new equipment
Read Article
[L]ooking at a Packet Trace File is often the first step in uncovering the problem. Like the TV Show "Yankee Workshop" just buying or having the same tools doesn't mean you can tur
Read ArticleDatacenter consolidation creates performance problems for slow Oracle 11g Client queries. An application's server infrastructure was moved from an international location into a cen
Read ArticlePentagon 911 Lessons Learned - IT Disaster Recovery Plan Bill Alderson discusses the technical and IT Best Practice lessons learned from the events subsequent to the Pentagon 911 d
Read ArticleEnterprise Architecture IT Disaster Recovery Plan Steps to APM Under Pressure This session takes ideas from many IT disaster critical problem resolution IT consulting engagements a
Read ArticleAPM Application Performance Monitoring Tools in the Theatre of War tells the story of how application performance management tools were deployed to analyze and report on key inteli
Read ArticleComplexity of WAN Optimization, Application Acceleration devices makes analysis of problems and root cause analysis more complex. Yes, they are beneficial, but if you have an issue
Read ArticleIT Network Redundancy - Just Another Single Point of Failure (SPOF)? Trace by reverse engineering the Network logical packet flow to find out! What is redundancy? Network redundanc
Read ArticleMTU defines Maximum Transmission Unit. Firewalls blocking ICMP disables IP's dynamic Path MTU Discovery causing fragmentation at VPN, L2TP tunnels impacting performance. Gateways a
Read ArticleOracle performance tuning -SQL and for that matter MS SQL tuning or any SQL server performance tuning can be analyzed by capturing TCP database transactions at the packet level. Th
Read Article
Oracle performance optimization ROI justification based on detailed packet analysis findings. This case study helps CIO's justify portfolio spending on database improvements.
Read ArticleSlow Domain Logon Analysis - Root Cause Identified - Solved! Root Cause Identified - Application Performance Optimized are the words CIO's and End Users enjoy hearing. Network Slow
Read ArticleIn the wake of the 9/11 Pentagon disaster, organizations faced unprecedented challenges in restoring vital IT systems and re-establishing secure communication infrastructures. This case study delves into the efforts of Bill Alderson and his team, who were tasked with rebuilding the Pentagon's communication infrastructure.
Bill Alderson was called upon shortly after the 9/11 attacks to lead the effort in restoring communication systems at the Pentagon. Upon arrival, the team encountered severe damage to communication circuits, network management systems, and security infrastructure. Comprehensive network documentation had been lost on compromised servers. The team had to start from scratch — creating new diagrams, strategies, and documentation. The Pentagon's reliance on legacy systems and compartmentalized operational silos made collaboration between different teams challenging.
The team adopted a holistic approach with a core focus on Technical Systemization — not just addressing immediate problems, but creating long-term solutions. Key elements included cross-silo collaboration (bringing security, desktop, network, and application teams together) and the creation of the Rapid Network Rendering (RNR) Database to centralize data and visualize the entire network infrastructure in real time. Detailed Visio diagrams mapped out the Pentagon's communication systems.
The Pentagon improved overall network resilience by 90%. Detailed system documentation and the RNR Database saved hundreds of hours in troubleshooting time. Communication failures were reduced by over 80%.
↑ Back to Case StudiesThis TCP sequence graph uncovers a network anomaly where high-stakes file transfers are prematurely terminated due to unexpected TCP Resets. Despite initial smooth progression, akin to the creative workflows in a Mad Men era, our modern-day digital transfer is disrupted — not by cigarettes and old-fashioned vices, but by a digital hiccup that could spawn a plot twist worthy of Don Draper's most challenging ad campaigns.
In a network mystery with high visibility akin to an ad firm's peak season rush, the issue at hand is not a lack of creative direction but a technological misfire where each aborted transfer is a missed deadline. The clue? A TCP Reset, a digital “no” in a world that demands “yes.” The twist? Packets captured at strategic test points reveal an internal MITM — our own security device in disguise, issuing Resets from both ends. The culprit exposed not by a smoking gun, but by incongruent Hop Counts and IP Fragment IDs, unmasking a Linux IPTABLES Firewall as the unexpected interloper in this tale of digital intrigue.
Some file transfers were pulling a Houdini, vanishing mid-way. Not all, mind you, just a select few that enjoyed the thrill of the incomplete journey. This wasn't just a network problem; it was a digital whodunit.
The first clue lay in the mysterious TCP Resets, like unexpected plot twists in a Hitchcock thriller. These resets were cutting off file transfers like a bad movie edit. The question was: who was yelling “cut!”? In the style of any good detective story, we looked for suspects. Was it a rogue firewall playing vigilante? Or perhaps a mischievous man-in-the-middle, a digital Moriarty of sorts?
After some digital sleuthing worthy of Sherlock Holmes himself, we pinpointed the culprit: a Linux IPTABLES Firewall with a penchant for drama. It was like discovering the butler did it, but in this case, the butler was a bunch of code on a mission to disrupt.
Just as Don Draper would pivot to meet a market challenge, the network team, with forensic precision and a touch of digital sleuthing, navigated away from open-source firewalls towards a more stable solution. The stakes were high, the data critical, and the solution — a change in the network's very infrastructure — mirrors the transformative steps an ad agency might take to evolve with the times.
↑ Back to Case StudiesIn the dynamic realm of cybersecurity education and testing, having a secure environment to explore vulnerabilities is crucial. DVWA (Damn Vulnerable Web Application) is a purpose-built platform designed for hands-on learning and testing of web-based security weaknesses. Developed using PHP and MySQL, DVWA allows users to work with command injection, SQL injection, cross-site scripting (XSS), and more.
DVWA provides a controlled environment where security professionals and students can safely practice identifying and exploiting common web vulnerabilities. Each challenge level progressively increases in difficulty, building practical skills that translate directly to real-world security assessments and penetration testing engagements.
↑ Back to Case StudiesERSPAN (Encapsulated Remote Switched Port Analyzer) enables remote network monitoring by encapsulating traffic within GRE tunnels. The session demonstrated configuration on Cisco 9K switches with source ports, destination addresses, and ACLs. It works across VMware, Linux, and Cisco platforms.
ERSPAN provides real-time packet capture without physical access, making it non-intrusive and highly scalable. Unlike traditional SPAN ports that require local access to the switch, ERSPAN routes mirrored traffic across the network through GRE encapsulation — enabling analysts to capture packets from remote locations as if they were directly connected to the monitored segment.
As businesses adopt cloud and distributed networks, ERSPAN becomes critical for automated monitoring and cybersecurity. The ability to remotely mirror traffic from any ERSPAN-capable device in the infrastructure means security teams can respond to incidents faster, with full packet-level visibility, regardless of physical location.
↑ Back to Case StudiesThis case study focuses on an ERSPAN implementation demonstrated during a Wireshark Wednesday event. The implementation involved setting up ERSPAN source ports, configuring loopback capabilities, and specifying packet destinations on a Cisco 9K switch.
The configuration included defining ERSPAN source sessions with specific monitor ports, establishing GRE tunnel endpoints, and routing mirrored traffic to the analysis workstation running Wireshark. The Cisco 9K switch served as the ERSPAN source, encapsulating selected port traffic and forwarding it to the designated destination IP.
Challenges included outdated firmware supporting only ERSPAN Type 1 frames (lacking timestamping). Type 1 frames provide the basic mirrored traffic encapsulation but do not include the high-precision timestamp headers available in later ERSPAN versions — a limitation when sub-millisecond timing accuracy is required for forensic analysis.
Future improvements include upgrading to ERSPAN Type 2 frames for nanosecond-resolution timestamps, enabling more precise correlation of events across distributed network segments.
↑ Back to Case StudiesThe DigiCert incident led to unexpected revocation of numerous SSL certificates, posing significant threats to organizations. Using the WireX Systems Ne2ition Platform for retrospective network analysis, a client needed to quickly identify affected certificates across their entire infrastructure.
The team segmented the client's network starting with the marketing department, using advanced data dimensions to filter and analyze traffic. Retrospective analysis allowed the team to examine historical network data — looking back through previously captured traffic to identify every SSL/TLS handshake involving DigiCert-issued certificates.
Within minutes, the team identified 655 compromised certificates, some dating back nearly a decade. The speed of identification was made possible by the platform's ability to index and query network metadata at scale, without requiring real-time capture during the incident window.
The rapid response improved customer trust and demonstrated the operational value of maintaining retrospective network analysis capabilities. Organizations that invest in historical traffic indexing gain a decisive advantage when unexpected certificate revocations, breaches, or compliance events demand immediate answers.
DigiCert Certificate Revocation Incident Reference
↑ Back to Case StudiesThe people who built the protocols, invented the tools, and shaped the discipline. Colleagues, mentors, and fellow practitioners.
Co-designer of TCP/IP. Google Chief Internet Evangelist. Known as the “Father of the Internet.”
Read Bio
Inventor of the Spanning Tree Protocol. “Mother of the Internet.” Pioneer of secure network protocols and TRILL.
Read Bio
Co-founder of Network General Corporation. Creator of the Sniffer protocol analyzer. DOJ Microsoft antitrust Technical Committee lead.
Read Bio
Founder and Chairman of the Computer History Museum. Princeton and Stanford education. Computing history preservation leader.
Read Bio
Chief Detective at Packet Detectives. SharkFest presenter. 20+ years solving network mysteries through packet analysis.
Read Bio
Virtual CISO and cybersecurity inventor at Secutor Consulting. Data science advanced analyst. InfraGard contributor.
Read Bio
USSTRATCOM C4 Systems Deputy Director. Pentagon J6 IT Services. 30-year U.S. Army career spanning nuclear, space, and cyberspace operations.
Read Bio
Global CISO at SoftBank Investment Advisers. U.S. Navy veteran. Zero-trust architecture pioneer. CISO Desk Reference Guide author.
Read Bio
Chief Security Strategist at Analyst1. 15+ years in threat intelligence. SANS Book of the Year. Featured on 60 Minutes.
Read BioVinton “Vint” G. Cerf is Vice President and Chief Internet Evangelist for Google. He is considered one of the “Fathers of the Internet” for his pioneering work as a co-designer of the TCP/IP protocol in the 1970s and beyond. Cerf is an influential voice on Internet policy and technology issues like privacy and security.
With the rise of more interactive and speed-sensitive Internet applications, Cerf has supported new protocols to optimize TCP/IP performance. He wrote in Communications of the ACM in 2015: “The ‘quickness’ of QUIC derives from four key design decisions, including reduced connection establishment time, encrypted packet headers, integration of congestion control with loss recovery, and a new transport layer security protocol.”
Privacy and security issues emerged alongside Internet evolution. Cerf has observed: “I think forevermore we have lost anonymity and privacy in the digital world. It's the case that anything you do electronically can be monitored.” He sees protecting privacy as an ongoing challenge that requires continuous vigilance, not just technical solutions.
Cerf believes security vulnerabilities are unavoidable aspects of complex, interconnected systems. In the earlier days of finalizing the internet protocols, Cerf thought that building security into the internet at launch was not a good idea as it would have lowered usage. He views that we are moving back towards the end-to-end principle, and by adopting the philosophy of not communicating with devices we do not recognize, we are headed towards improved security on the network.
Cerf stresses pragmatic mitigation efforts focused on specific threats rather than seeking any final “fix.” He notes that the big challenge is to continue being open to innovation while limiting vulnerabilities and dealing with threats by designing specific solutions for specific problems. Still, no one solution will do it all.
In 1997, President Bill Clinton presented the U.S. National Medal of Technology to Vint Cerf and Bob Kahn for their work on TCP/IP.
↑ Back to PioneersFew names resonate with as much influence in computer networking as Radia Joy Perlman. Often hailed as the “Mother of the Internet,” Perlman's groundbreaking contributions have helped sculpt the foundational structure of today's digital connectivity.
Born in Portsmouth, Virginia, on January 1, 1951, Perlman grew up in Loch Arbour, New Jersey. Her parents were engineers for the US government — her mother a computer programmer and trained mathematician, her father a radar specialist. She attended MIT, studying Mathematics, and developed TORTIS, a child-friendly programming language for educational robotics, establishing her as a pioneer in teaching programming to young children.
Perlman's invention of the Spanning Tree Protocol (STP) prevented data loops in Ethernet networks, ensuring reliable and predictable communication and reducing network vulnerabilities. Her creation of TRILL (Transparent Interconnection of Lots of Links) integrated security considerations to simplify network configurations while enhancing performance.
Perlman's work extended beyond connectivity to developing secure networking protocols. Her emphasis on mastering and mitigating vulnerabilities in network infrastructure centered on designing protocols and mechanisms to prevent unauthorized access and exploitation of sensitive data. Her advocacy for simplicity in network design — developing straightforward and robust protocols — contributed to creating less vulnerable systems. She was inducted into the Internet Hall of Fame in 2014.
Her influential books include Interconnections: Bridges, Routers, Switches and Interworking Protocols and Network Security: Private Communication in a Public World, widely used in higher learning institutions.
↑ Back to PioneersDr. Harry J. Saal, a distinguished American technology entrepreneur, executive, and philanthropist, has left an indelible mark on Silicon Valley and beyond through visionary leadership and impactful contributions to the tech industry and community welfare.
A Westinghouse Science Talent Search finalist in 1960, Dr. Saal earned his B.A., M.A., and Ph.D. in High Energy Physics from Columbia University, graduating magna cum laude in 1969. He joined the Stanford University Linear Accelerator Center and lectured in Stanford's computer science department.
Dr. Saal's corporate trajectory began with IBM, contributing to the scientific center in Israel and the IBM General Products division in San Jose. His entrepreneurial spirit led to founding Nestar Systems in 1979, which pioneered local area network systems for personal computers in collaboration with Len Shustek. In 1986, he co-founded Network General Corporation — a groundbreaking venture in network diagnostics. The creation of the Sniffer protocol analyzer solidified his role as a technological pioneer.
In 2002, Dr. Saal was appointed by the United States Department of Justice to lead the Technical Committee overseeing the Microsoft anti-trust case. Between 1989 and 1996, he dedicated over 20% of his net worth to philanthropy, including medical research, education, and helping Jewish refugees from Russia. He served as director and chairman of the Silicon Valley Community Foundation and the San Jose Museum of Art.
↑ Back to PioneersLeonard J. Shustek is a luminary figure whose influence transcends the boundaries of academia, setting him apart from the typical tech entrepreneur. With a legacy marked by a great zeal for computer education and a relentless drive for innovation, Len Shustek is a pillar in computing and technology.
Born December 29, 1947, Shustek earned his B.S. in Electrical Engineering from Princeton University in 1969, then a Master's degree and Ph.D. in Computer Science from Stanford University. During his tenure as a faculty member at Carnegie Mellon University, he made substantial contributions to computer graphics and computer-aided design.
As Chairman of the Board at the Computer History Museum, Shustek profoundly impacted the preservation of computing history. Under his leadership, the museum substantially expanded its collection of computing-related artifacts, documents, and oral histories, transforming it into a comprehensive repository of computing history. His advocacy for technology education extends to students, educators, and enthusiasts through the museum's programs and initiatives.
Shustek's collaborations with industry leaders, tech companies, and innovators facilitated the acquisition of significant artifacts and initiated valuable dialogues between the computing community and the public. He champions STEM disciplines, advocating for their importance in preparing future generations for an increasingly tech-driven world.
↑ Back to PioneersBetty DuBois, the Chief Detective at Packet Detectives, a network performance consulting and training firm based in Atlanta, GA, has been solving mysteries since 1997. Experienced with a range of hardware and software packet capture solutions, Betty captures the right data, in the right place, and at the right time to find the real culprit. She shares her passion for packets as a presenter each year at SharkFest.
Betty has a rich background in network assessments, fault isolations, and deploying network analysis equipment. Specializing in rapid on-site diagnoses, her expertise ensures organizations receive swift and definitive solutions to network infrastructure challenges, minimizing downtime and optimizing performance.
Her instructional capabilities shine through roles as a Course Developer at ISS, Senior Instructor at Network Associates and Network General. Known for making complex subjects engaging, she brings real-life examples into the classroom. Her accomplishments include creating courses for CloudShark Academy, presenting at SharkFest, and contributing to publications such as “Using Wireshark Command Line Tools” and “Protocol Deep Dive: DNS” on Pluralsight.
Betty's commitment is further exemplified through her Austin Cyber Show session “Mystery Solved: Deep Packet Security Analysis,” utilizing Wireshark to demonstrate critical parameters negotiated during the TLS Handshake.
↑ Back to PioneersBrian Clinkenbeard is a dedicated cybersecurity expert with over nine years of experience, serving as a Data Science Advanced Analyst and Virtual CISO at Secutor Consulting since January 2015. He brings expertise in cybersecurity and infrastructure security planning.
Brian holds certifications from Microsoft and has undergone extensive training in security and resilience from Texas A&M Engineering Extension Service. His core competencies span network monitoring tools, information security, incident response, and vulnerability management and assessment. He has a proven track record of transforming, modeling, and visualizing data to improve clients' security postures.
One of Brian's notable accomplishments includes creating a web-based support intranet that significantly reduced call times and increased issue resolution for a third-party contract provider, earning him an award for his innovative solution. He actively contributes to the community through volunteer work, including serving as Deputy Sector Chief for InfraGard National Members Alliance and President of the MSDN Dallas Chapter.
↑ Back to PioneersColonel (COL) David Wills retired from the U.S. Army in 2021 after serving as the Deputy Director for C4 Systems at USSTRATCOM since 2015. His distinguished career emphasized military excellence and strategic leadership, overseeing global-integrated C4 systems for missions ranging from strategic decision-making to nuclear, global strike, space, and cyberspace operations.
From 2013 to 2015, Colonel Wills served as the J6 Deputy Director for Information Technology Services at the Pentagon, leading over 200 personnel. He managed a $50M IT infrastructure, directed a $61M annual budget, and coordinated JS IT service delivery with OSD, DISA, and NSA.
Wills demonstrated his commitment to service in both peace and war, deploying in support of Operation Sea Signal in Guantanamo Bay (1994), Operation Southern Watch in Dhahran, Saudi Arabia (1996), and Operation Iraqi Freedom (2003 and 2007). He graduated from USMA in 1991 and earned a Master's degree in Strategic Studies from USAWC. Accolades include the Defense Superior Service Medal, Bronze Star, and Parachutist Badge.
↑ Back to PioneersGary Hayslip's professional journey affirms his commitment to cybersecurity excellence and information technology leadership. He started his career in the U.S. Navy, serving in various executive roles on Active Duty and as a Federal Government employee.
As Chief Security Officer at SoftBank Investment Advisers (SBIA) — a globally recognized firm with over $200 billion in capital and 460+ portfolio companies — Gary serves as the principal executive and architect of cybersecurity initiatives. He leads a geographically dispersed security team overseeing security operations across 16 global offices, planning and deploying zero-trust architecture to support cloud-first enterprise infrastructure.
Gary's expertise extends to providing cybersecurity and business continuity due diligence on potential investments, having reviewed over 600 companies. He holds an MBA from San Diego State University and a Professional Certificate in Managing Risk in the Information Age from Harvard University.
As a keynote speaker and author, he co-authored the influential CISO Desk Reference Guide series and authored The Essential Guide to Cybersecurity for SMBs and Developing Your Cybersecurity Career Path. These publications are widely regarded as leading resources for CISOs.
↑ Back to PioneersJon DiMaggio is a highly accomplished cybersecurity professional and published author, currently holding the position of Chief Security Strategist at Analyst1. With over 15 years of dedicated experience, he has become a recognized authority in threat intelligence.
Before his current position, DiMaggio served as a Senior Threat Intelligence Analyst at Symantec from 2014 to 2020, leading complex threat investigations. He also contributed as a Senior Fusion Analyst at General Dynamics Information Technology, focusing on identifying state-sponsored cyber threats and attributing TTPs of Advanced Persistent Threats.
DiMaggio holds a patent titled “System and Method to Detect Covert Channels Structured in IPv6 DNS Transactions” (US 9692771, 2018). He authored The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime (No Starch Press, 2022), which earned the SANS Difference Maker Award for Book of the Year. His “Ransomware Diaries” series — including “Unlocking LockBit” — has been featured on 60 Minutes, The New York Times, Bloomberg, CNN, Reuters, and Wired.
↑ Back to PioneersPaul Barrett holds the position of Chief Technology Officer (CTO), Enterprise, at NETSCOUT. With a tenure spanning over eight years, he has been instrumental in steering technological advancements at the organization. Before this role, he served as Chief Architect at NETSCOUT from 2011 to 2015.
Paul's journey with NETSCOUT began in 2011 with the acquisition of Psytechnics Ltd, where he served as Head of Engineering. Before Psytechnics, he contributed to BT Labs, focusing on voice transmission for GSM and 3GPP. His current role oversees enterprise service assurance, cybersecurity, and DDOS products, encompassing real-time network analysis, unified communications, digital signal processing, encryption, and intellectual property.
Between 2005 and 2016, Paul assumed pivotal roles as vice chair and working party chair at the United Nations' International Telecommunication Union (ITU), simultaneously leading the United Kingdom's delegation for ITU-T study groups. He is a named inventor on 20 patent applications and is recognized as a Senior Member of the IEEE and a Chartered Engineer and Member of the IET in the United Kingdom.
Paul earned a Master of Engineering in Electronic Systems Engineering from the University of York. He actively engages in community work, including serving as Board Member, Treasurer, and President of Habitat for Humanity of Greater Lowell from 2013 to 2019.
↑ Back to PioneersWireshark tutorials, protocol analysis, and network forensics methodology. Practical knowledge from real-world operations.
Real-time packet analysis, network troubleshooting, and security enhancement with the premier protocol analyzer.
Read Guide
Customizing profiles, visual tools, custom columns, and advanced techniques for efficient network analysis.
Read Guide
Packet drivers, network interfaces, snap length, precision capture, and interface configuration fundamentals.
Read Guide
Lightweight packet capture without GUI overhead. Interface selection, file management, and ring buffers.
Read Guide
Client-side vs. server-side capture. Network taps vs. SPAN ports. Optimal placement for effective analysis.
Read Guide
TCP stream reassembly, HTTP object extraction, handling executables, and dealing with encrypted traffic.
Read Guide
MAC address, transport name, and IP resolution. DNS packet data, external resolvers, and manual assignment.
Read Guide
Time display formats, packet timing, time references, and multi-threaded conversation analysis.
Read Guide
Capture filters vs. display filters. DNS traffic filtering, advanced filter crafting, and right-click filtering.
Read Guide
L1/L2 assessment methodology. Certification, skill validation, and forensic analysis capabilities.
Read Guide
Geographic location tracing for threat detection, network forensics, and global traffic analysis.
Read Guide
Conversation categorization, time visualization, anomaly detection, and precision filtering for network analysis.
Read GuideA new digital border wall for your network, datacenter or device? Compromise of the wrong database can be catastrophic to a nation, customers, the organization - and you! United St
Read ArticleThe Pentagon was locked down; our team was escorted by heavily armed forces outside the emergency perimeter, through security and past the office of the Secretary of Defense until
Read Article
How Close To Maximum Theoretical Performance Are Your Applications? What Would It Cost To Improve? If Key Applications Ran At Near Theoretical Speed How Much Would It Save? How Lon
Read ArticleTCP Selective Ack TCP Dup Ack TCP Previous Segment Lost TCP Selective Acknowledgment creates performance complexities. Bill Alderson provides a short TCP tutorial on the function o
Read ArticleEvery organization has a unique technical architecture “fingerprint,” characterized not only by the products it has chosen to deploy, but also by the organization’s business cultur
Read Article
Most cyber professionals don't have the opportunity to see an actual cyberattack play out. They understand concepts and hear about different TTPs, but rarely see an entire attack f
Read Article
Consider the anatomy of a cyberattack. Look at gaps in security tools and cost of breach. Unleash the Full Potential of Network Detection and Response with NDR capabilities.
Read Article
Defend the "When" with Network Intelligence. Perhaps the oldest clich'e in cybersecurity is "it's not if, but when." ExtraHop explores closing the breach intelligence gap.
Read Article
Ransomware has evolved and time may not be on your side. Once inside, attackers leave ransomware vulnerable to detection in five key ways. Learn how defenders can exploit these gaps.
Read ArticleIn the digital age, cybersecurity is not just a necessity but a critical component of any organization's IT infrastructure. With the increasing incidence of cyber threats, the need for advanced tools to monitor, analyze, and thwart potential attacks is more pressing than ever. One such tool that stands out is Wireshark, a renowned network protocol analyzer that offers deep insights into network traffic.
Wireshark is an open-source tool that captures and analyzes packets of data on a network. It provides a microscopic view of network activities, presenting the data in a comprehensible format for network administrators and cybersecurity experts. By dissecting the data packets, Wireshark reveals invaluable information about the network's operational aspects, potential vulnerabilities, and ongoing threats.
Wireshark's ability to capture and analyze data packets in real-time is instrumental in identifying and responding to threats promptly. By monitoring network traffic, cybersecurity professionals can detect anomalies that may signify a breach or an impending attack, enabling them to take immediate action to mitigate potential risks.
Beyond its utility in cybersecurity, Wireshark is an excellent tool for network troubleshooting. It assists in pinpointing network problems, from minor issues affecting performance to significant disruptions. By analyzing traffic flow and packet details, Wireshark provides insights that aid in optimizing network performance and reliability.
Installing Wireshark is straightforward, with versions available for various operating systems. Once installed, users can select the network interface to monitor. Wireshark displays the traffic in real-time, allowing analysis of individual packets, protocol inspection, and scrutiny of various layers of network communication. Powerful filtering capabilities — both capture and display filters — enable efficient analysis of specific traffic types.
↑ Back to Tech GuidesIn today's interconnected world, navigating and understanding network traffic is not just a skill — it's a game-changer. Wireshark empowers IT professionals, cybersecurity experts, and business leaders to peek into digital conversations flowing through their networks in real time, deciphering each packet's story and fortifying defenses against cyber threats.
Wireshark allows you to customize your experience with profiles tailored to your needs. Whether you're a seasoned analyst or a newcomer, creating and managing profiles ensures you have the right tools and settings at your fingertips. This customization enhances efficiency and makes navigating through complex data intuitive and insightful.
Wireshark transforms raw data into actionable insights. Visual tools like packet diagrams and customizable layouts make it easy to visualize network traffic patterns and anomalies. Adjusting text sizes, rearranging panels, and adding custom columns further enhance clarity.
Beyond basic analysis, Wireshark offers advanced features that push the boundaries of network intelligence. Automate repetitive tasks with scripting, develop custom dissectors to decode proprietary protocols, or create complex capture filters to focus on specific traffic patterns.
↑ Back to Tech GuidesComprehending network traffic is essential for protecting sensitive data and optimizing network efficiency. Wireshark relies on specialized packet drivers tailored for different operating systems — libpcap on macOS and NPcap on Windows — providing a robust platform to capture and analyze network traffic.
Upon launching Wireshark, users encounter network interfaces — Ethernet, Wi-Fi, virtual adapters, VPN tunnels, and more. Each interface serves as a gateway to distinct segments of network activity. Effective interface management enables users to focus analysis on specific areas while filtering out irrelevant traffic.
Wireshark's snap length functionality allows users to specify how much of each packet's payload to capture — essential for environments prioritizing storage efficiency and data minimization. By defining snap lengths, users capture critical packet headers (Ethernet, IP, TCP) while omitting unnecessary payload data, optimizing storage and streamlining analysis workflows.
↑ Back to Tech GuidesIn cybersecurity and network diagnostics, efficiency and precision are everything. Wireshark's command line tools — dumpcap and tshark — offer a direct, lightweight alternative to the graphical interface, ideal for swift data capture and real-time analysis.
On Windows, add Wireshark's directory to your PATH. On macOS, modify your PATH to include /Applications/Wireshark.app/Contents/MacOS. Use dumpcap -D to list available interfaces, -i to specify the capture interface, -w to save captures, and -b for ring buffers for continuous, efficient data storage.
Understanding the optimal capture points can significantly elevate your ability to diagnose and resolve network problems. Before capturing packets, it's crucial to define the problem clearly — the nature of your situation will dictate where you should deploy Wireshark.
When troubleshooting involves client-side issues, capturing from the client device or at the access point provides invaluable insights into traffic dynamics that directly impact user experience. This approach helps diagnose connectivity problems and provides visibility into how network conditions impact application performance.
Network Taps remain the gold standard for thorough packet capture. These physical devices passively intercept and duplicate network traffic without disrupting flow. By inserting a tap in line, you capture every packet without introducing latency or affecting performance.
SPAN Ports (Switched Port Analyzer) are configured on managed switches to mirror traffic from one or more ports to a monitoring port. While more accessible in many environments, SPAN ports may drop packets under heavy load and introduce timing variations.
↑ Back to Tech GuidesThe ability to extract files from packet captures (PCAPs) can be a game-changer for in-depth cybersecurity investigations and Capture the Flag (CTF) challenges. This guide explores how to harness Wireshark's features to extract and reassemble files from PCAPs, enhancing forensic capabilities.
To extract files effectively, Wireshark must be configured to reassemble TCP streams. By enabling TCP stream reassembly, Wireshark treats the TCP stream as a continuous data flow, allowing you to see the complete picture rather than disjointed fragments.
Navigate to File → Export Objects → HTTP to see reassembled HTTP objects. Wireshark presents a list of objects extracted from the capture, which can be saved directly. For non-HTTP traffic, follow the TCP stream to view consolidated raw data.
When dealing with executable files or binaries, always use a secure, isolated environment such as a virtual machine. Encrypted traffic requires the proper decryption keys — Wireshark cannot decrypt HTTPS traffic without them.
↑ Back to Tech GuidesWhen you delve into a Wireshark packet capture, you're greeted with IP addresses, port numbers, and other technical details. Wireshark's name resolution translates these into human-readable formats — replacing IP addresses, MAC addresses, and port numbers with hostnames and service names.
The time column in Wireshark acts as a meticulous timekeeper, tracking elapsed moments since the commencement of a packet capture session. Understanding its nuances unlocks the ability to reconstruct timelines, pinpoint anomalies, and discern patterns that would otherwise evade detection.
Wireshark offers a spectrum of choices — local time, UTC, or seconds since capture inception. Mastery of these settings transforms timestamps into actionable insights, bridging the gap between network traffic and real-world events.
Within Wireshark, a single click designates a packet as a benchmark against which subsequent intervals are measured. For concurrent TCP conversations, the “Time Since Previous Frame” column delineates intervals between packets within the same conversation, giving clarity on latency issues and performance bottlenecks.
↑ Back to Tech GuidesFew tools in cybersecurity match Wireshark's prowess for network traffic analysis. If you've ever felt overwhelmed by the sheer volume of data flowing through your network, effective filtering is your gateway to harnessing Wireshark's power.
Capture filters serve as the gatekeeper, allowing you to record specific types of traffic selectively before packets are saved. Whether focusing on DNS requests or TCP communications between designated devices, capture filters streamline analysis and conserve storage. Start broad and refine based on insights gathered.
Post-capture display filters empower you to sift through captured packets and pinpoint those of interest. These filters are invaluable for in-depth analysis — examining ARP packets for troubleshooting or focusing on DNS traffic to understand query patterns.
! operator to exclude specific traffic types from viewIn today's rapidly evolving digital landscape, the demand for cybersecurity professionals with specialized skills is at an all-time high. As cyber threats grow more sophisticated, the necessity for advanced forensic analysis tools like Wireshark has never been more critical.
Wireshark empowers users to capture and analyze network traffic in real-time, offering invaluable insights into network performance, security incidents, and troubleshooting. Whether pinpointing the root cause of a network issue or detecting the early signs of a cyberattack, Wireshark's capabilities are unmatched.
In today's cybersecurity landscape, the ability to trace the origins of network traffic isn't just advantageous — it's indispensable. Wireshark's GeoIP feature translates raw IP addresses into physical locations on a global map, transforming how analysts investigate and respond to threats.
Regularly update GeoIP databases from reputable sources like MaxMind to ensure precise location information. Adhere to privacy regulations and ethical guidelines when handling location-based data. Maintain compliance with organizational policies and legal requirements.
↑ Back to Tech GuidesIn network analysis and cybersecurity, interpreting packet captures can feel like navigating through a dense data jungle. Wireshark's statistics feature provides a zoomed-out, bird's-eye view of the entire network ecosystem captured in a trace file.
Wireshark categorizes network traffic into conversations based on addressing layers — Ethernet, IPv4, IPv6, TCP, UDP, and more. Each conversation encapsulates bilateral data exchanges between endpoints. By sorting and filtering conversations, analysts can pinpoint critical exchanges, identify dominant communication channels, and detect irregular patterns.
Statistics serve as a potent detective tool for uncovering anomalies such as port scanning activities. Observing a sequence of low-numbered port accesses in non-sequential order can signify attempts to probe for vulnerable services — a critical indicator of potential security breaches.
Wireshark provides graphical representation through relative start and duration columns, offering a visual timeline of when conversations commenced and how long they persisted. This temporal insight is pivotal for correlating network events with communication patterns.
↑ Back to Tech GuidesIn the ever-evolving landscape of internet protocols, TCP-QUIC stands as a significant milestone. Designed to enhance the speed and security of online communications, it combines the reliability of TCP with the performance of QUIC. TCP was developed over 50 years ago; QUIC started as a Google experiment in 2013 and became a standard in 2020.
TCP is one of the main protocols of the Internet Protocol Suite, ensuring reliable, ordered, and error-checked delivery of data between applications. Despite its widespread use, TCP has limitations in terms of latency and speed, particularly in lossy or congested networks. QUIC was developed to overcome these limitations, operating over UDP and incorporating multiplexed connections, improved congestion control, and faster encryption. If QUIC cannot establish a connection, it falls back to TCP.
QUIC typically uses UDP port 443. As of this writing, QUIC accounts for approximately 50% of internet traffic, reflecting its rapid adoption across major platforms and services.
↑ Back to Tech GuidesSessions, speakers, and technical presentations from the inaugural Austin Cyber Show at Concordia University Texas, May 10-11, 2022. CISO perspectives, threat intelligence, and hands-on cybersecurity analysis.
Nick Leghorn, Director of Application Security, The New York Times. Session: Writing Policies That Aren't Miserable for Everyone. A new approach to policy documentation that reduces pain.
Read Article
Session by Charlene Deaver-Vazquez of FISMACS.com. New Mathematical Models for Forecasting Cyber Attacks. Probability theory gives us the ability to quantify risk and forecast events.
Read Article
Austin Cyber Show Session: The Art of Cyberwarfare. Jon DiMaggio shares insights on understanding and analyzing cyber attacks by advanced attackers, such as nation states.
Read Article
Austin Cyber Show Session by Gary Hayslip, Author, CISO Executive Primer. Cliff notes from a CISO Author's Perspective. Join us as Gary shares insights from his experience as a CISO.
Read Article
Colonel (COL) David Wills, U.S. Army (ret. 2021), Deputy Director for C4 Systems, U.S. Strategic Command. Keynote on managing tactical military networks and communications.
Read Article
The Austin Cyber Show is excited to showcase authors who bring their expertise to the Cybersecurity industry through their publications. Join this free Cybersecurity conference via
Read Article
As your lovely mother walks out the door on this mother’s day, she backs out of the driveway to leave, only for you to find her wallet has fallen out of her purse and into the stre
Read Article
CISO: Day in the Life of CISO's Sameer Sait & Mustapha Kebbeh In this session, two seasoned CISO's will talk about their experiences in leading and managing information security or
Read Article
Data versus Measurement: Why Your Current Metrics Aren’t Enough It’s time to get away from just tracking click rates and completion times, and focus on building a comprehensive pro
Read Article
The Big Disruption in Cybersecurity Security awareness & training programs and content has improved dramatically in recent years, yet security and risk leaders still cannot quantif
Read Article
See it all in 55 seconds. Then pick the sessions of interest for the list of blogs below. In random order: Or http://austincyber.show/blog/ to choose them by picture.
Read Article
Social Engineering Attacks: Why do we fall for them and what we can do about it. Ian Wilkinson Would you believe that 98% of all cybercrime or cyber-attacks within the past year ha
Read Article
Networked medical device connectivity. What does this mean and why does it matter? Life sustaining devices such as patient monitors, infusion pump systems, ventilators, and a host
Read Article
Assigning Cost to Security Risk. The importance of communicating cyber risk in financial terms to the board is growing day by day. Many have long considered this necessary given th
Read Article
Reclaiming Your Identity Learn how to claim your identity before criminals do, or reclaim your identity after criminals have used your stolen "personally identifiable information"
Read Article
Protecting customer's data privacy has become a new source of stress for any company with a web presence. Compounding that, international trade requires compliance with internation
Read Article
The nature of cybercrime is constantly changing and becoming more difficult to defend. This session will evaluate some of these changes in the nature of the internet and the new at
Read Article
Mystery Solved: Deep Packet Security Analysis TLS version and cipher suite are the two most critical parameters negotiated during the TLS Handshake. Agreeing on a less secure optio
Read Article
In this session Brian Clinkenbeard, one of the prolific and beloved security gurus of the industry, will look at exposing failures in incident response through case study. Brian is
Read Article
We welcome attendees to examine in an interactive session the latest cybersecurity trends and their implications for organizations facing new and emerging cyber risks and threats.
Read Article
Remaining Ransom Aware Ransomware, among the most intimidating threats on today’s security horizon, is an issue best approached from a “not if but when” perspective. It’s no longer
Read Article
This session will report on some observations about how the degree of convergence of physical and cyber security is evolving in larger organizations from a number of industries as
Read Article
Sam Harris, Stratascale Building a Modern SOC Requires Continuous Attack Surface Validation: The Modern SOC requires continuous validation of the attack surface to understand what
Read Article
Building a Security Team that Never Says “No” One of the most prevalent perceptions of any security team is that they just always say “no,” that they will be a blocker to progress
Read Article
Would you board a plane if you knew the pilot got all As in flight school? Probably yes, but what if you learned that the pilot got all "A"s , but this was their first time actuall
Read Article
Near 50 years ago Internet Protocol Pioneers imagined a network that would interconnect people around the world. Little by little the Internet Engineering Task Force IETF though wo
Read Article
The fundamentals of Exfiltration prevention start with Data Loss Prevention DLP. Below is a diagram of various DLP methods designed to prevent data from leaving an organization by
Read Article
Breach Defense is one of five Certificates offered. Breaking down the anatomy of a massive breach starts with a diagram describing attacker steps taken to avoid detection. Several
Read Article
May 10-11 2022 Session by James Azar CyberHub Podcast Title: Double Espresso Morning Cyber Brief to Start the Day Join us as James gets AustinCyber.Show off to a Double Espresso st
Read ArticleFour decades of packet-level diagnostics, incident response, and forensic analysis. If your organization is facing a complex technical challenge, get in touch.
Work with Bill
Social Engineering Cyber Attacks
Originally published 2022-04-27
Social Engineering Attacks: Why do we fall for them and what we can do about it.
By Dr. Ian Wilkinson
Would you believe that 98% of all cybercrime or cyber-attacks within the past year have been the result of social engineering? Seismic data loss attributed to some form of social engineering attack has been an epidemic-level threat that is currently plaguing thousands of people, both personally and professionally, at home and in the workforce. Phishing, a highly effective method that enables threat actors to deceive users and steal important data normally through unsolicited email attempts, was the cause of more than 240k successful cyberattacks in 2021. Addressing social engineering-induced cyber-attacks is important to information technology (IT) security managers to minimize organizational risks and effectively safeguard data from associated security breaches.
However, most of us think we practice vigilance and caution when exploring our connected world. We use protective tools and measures, processes, and procedures, yet the numbers do not lie. Social engineering is a method used by threat actors – employing their tactics, techniques, and procedures to trick us into providing sensitive information or information that can be used against us, yielding the desired outcome that benefits a threat actor. S So why do we keep falling for social engineering attacks and when are we most vulnerable? Well, it has everything to do with how we perceive the world around us.
Most of our behavior can be mapped to a theory expressed by a professor of psychology at the Yale University School of Management. The basis of Dr. Victor Vroom’s Expectancy Theory suggests that most of our behavior is a product of and motivated by anticipated results or consequences. Vroom (1964) proposed that a person behaves in a certain way based on the expected result of the chosen behavior. Knowing ourselves, our connected environment, and tailoring our expectations in favor of vigilance can be the key to reducing our vulnerability to social engineering attacks.
About Ian Wilkinson
Ian Wilkinson CTO|MA-ITM|PMP|ITIL|CISSP|GCIH|GCIA|TS-SCI - United States Army
Ian Wilkinson CEO Cyber Ballet LLC
Ian’s professional experience reflects 25 years of creative leadership and visionary capacities in complex, competitive, and highly regulated government, and commercial information technology industries. His leadership has been sought by domestic and international partners—lead teams which managed ERP systems, cybersecurity, systems integration, vendor relationships, network infrastructure, and organizational support. As Founder and CEO of Cyber Ballet has been assisting organizations in developing their information technology (IT) strategy and infrastructure, facilitate IT training, and provide innovative solutions that take advantage of opportunities for growth.
Join US and Canada cyber community members at the inaugural Austin Cyber Show Conference at Concordia University Texas, May 10-11. During the two-day cyber defense conference, participants can engage in discussions with peer leaders and industry experts on the cyber risks and challenges that businesses, leaders, developers, educators, and students face each day.