Slides for my 32C3 (Chaos Computer Congress 2015) talk about how to sanitize and anonymize binary packet capture files (PCAP/PCAPng). The talk video recording can be found here: https://media.ccc.de/v/32c3-7294-sanitizing_pcaps#download
Packet Analysis - Course Technology Computing Conference
Presenter: Lisa Bock - Pennsylvania College of Technology
Most network administrators are well-versed in hardware, applications, operating systems, and network analysis tools. However, many are not trained in analyzing network traffic. Network administrators should be able to identify normal network traffic in order to determine unusual or suspicious activity. Network packet analysis is important in order to troubleshoot congestion issues, create firewall and intrusion detection system rules, and perform incident and threat detection. This hands-on presentation will review fundamental concepts necessary to analyze network traffic, beginning with an overview of network analysis, then a review the TCP/IP protocol suite and LAN operations. Participants will examine packet captures and understand the field values of the protocols and as to what is considered normal behavior, and then examine captures that show exploits, network reconnaissance, and signatures of common network attacks. The program will use Wireshark, a network protocol analyzer for Unix and Windows, to study network packets, look at basic features such as display and capture filters, and examine common protocols such as TCP, HTTP, DNS, and FTP. Time permitting, the presentation will provide suggestions on how to troubleshoot performance problems, conduct a network baseline, and how to follow a TCP or UDP stream and see HTTP artifacts. Participants should have a basic knowledge of computer networking and an interest in the subject.
Slides for my 32C3 (Chaos Computer Congress 2015) talk about how to sanitize and anonymize binary packet capture files (PCAP/PCAPng). The talk video recording can be found here: https://media.ccc.de/v/32c3-7294-sanitizing_pcaps#download
Packet Analysis - Course Technology Computing Conference
Presenter: Lisa Bock - Pennsylvania College of Technology
Most network administrators are well-versed in hardware, applications, operating systems, and network analysis tools. However, many are not trained in analyzing network traffic. Network administrators should be able to identify normal network traffic in order to determine unusual or suspicious activity. Network packet analysis is important in order to troubleshoot congestion issues, create firewall and intrusion detection system rules, and perform incident and threat detection. This hands-on presentation will review fundamental concepts necessary to analyze network traffic, beginning with an overview of network analysis, then a review the TCP/IP protocol suite and LAN operations. Participants will examine packet captures and understand the field values of the protocols and as to what is considered normal behavior, and then examine captures that show exploits, network reconnaissance, and signatures of common network attacks. The program will use Wireshark, a network protocol analyzer for Unix and Windows, to study network packets, look at basic features such as display and capture filters, and examine common protocols such as TCP, HTTP, DNS, and FTP. Time permitting, the presentation will provide suggestions on how to troubleshoot performance problems, conduct a network baseline, and how to follow a TCP or UDP stream and see HTTP artifacts. Participants should have a basic knowledge of computer networking and an interest in the subject.
Slides supporting the "Computer Networking: Principles, Protocols and Practice" ebook. The slides can be freely reused to teach an undergraduate computer networking class using the open-source ebook.
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet).
Slides supporting the "Computer Networking: Principles, Protocols and Practice" ebook. The slides can be freely reused to teach an undergraduate computer networking class using the open-source ebook.
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet).
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
Design an Implementation of A Messaging and Resource Sharing Softwarenilabarai
In this article it has been looked how to program using sockets by implementing an echo server along with a client that is used to send and receive string messages. It will start off by giving a quick introduction to TCP/IP fundamentals and then explain how sockets fit into the diagram. Most network application can be divided into two pieces: a client and a server. A client is the side that initiates the communication process, where as the server responds to incoming client requests. There would be contains three types of service from this software, that is Message Transfer service, Voice Transfer service and File Transfer service. All this sorts are the design issue of this software.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
3. OSI Model Layers Application Presentation Session Transport Network Data Link Physical Layer - 7 Layer - 6 Layer - 5 Layer - 4 Layer - 3 Layer - 2 Layer - 1 User support Layers or Software Layers Network support Layers or Hardware Layers Core layer of the OSI
4. Application Layer Application Layer is responsible for providing an interface for the users to interact with application services or Networking Services . Ex: Web browser, Telnet etc. Application Application Presentation Session Transport Network Data Link Physical
5. Examples of Networking Services Service Port No. HTTP 80 FTP 21 SMTP 25 TELNET 23 TFTP 69
6. Application Data flow -- Application Layer Data 21 80 25 67 53 69 Presentation Session Transport Network Data Link Physical
7. Presentation Layer Presentation Layer It is responsible for defining a standard format to the data. It deals with data presentation. The major functions described at this layer are.. Encoding – Decoding Ex: ASCII, EBCDIC (Text) JPEG,GIF,TIFF (Graphics) MIDI,WAV (Voice) MPEG,DAT,AVI (Video) Encryption – Decryption Compression – Decompression Presentation Application Presentation Session Transport Network Data Link Physical
8. Data flow -- Presentation Layer Data Data Application Presentation Session Transport Network Data Link Physical
9. Session Layer Session Layer It is responsible for establishing, maintaining and terminating the sessions. Session ID is used to identify a session or interaction. Examples : RPC Remote Procedural Call SQL Structured Query Language ASP AppleTalk Session protocol Session Application Presentation Session Transport Network Data Link Physical
10. Data flow -- Session Layer Data Data Data Application Presentation Session Transport Network Data Link Physical
18. Sequencing & Reassembling Hello! How are you ? Hello! 1/5 How 2/5 Are 3/5 You 4/5 ? 5/5 Hello! How are you ? Hello! How are you ? Hello! 1/5 How 2/5 Are 3/5 You 4/5 ? 5/5 Hello! 1/5 How 2/5 Are 3/5 You 4/5 ? 5/5 A B Hello! How are you ?
21. Error Correction Hello! How are you ? Hello! 1/5 How 2/5 Are 3/5 You 4/5 ? 5/5 Hello! How are you ? Hello! 1/5 Are 3/5 You 4/5 ? 5/5 Hello! 1/5 Are 3/5 You 4/5 ? 5/5 Segment Missing How 2/5 How 2/5 Hello! How are you ? Hello! 1/5 Are 3/5 You 4/5 ? 5/5 Hello! How are you ? A B
22. Data flow -- Transport Layer Data Data Data Data Segment TH Application Presentation Session Transport Network Data Link Physical
23. Network Layer Network Layer It provides Logical addressing & Path determination (Routing) in this layer. The protocols that work in this layer are: Routed Protocols : IP, IPX, AppleTalk.. Etc Routed protocols used to carry user data between hosts. Routing Protocols : RIP, OSPF.. Etc Routing protocols performs Path determination (Routing). Network Application Presentation Session Transport Network Data Link Physical
24. Routed Protocols Segment S.IP: 10.0.0.1 D.IP:10.0.0.2 Segment S.IP: 10.0.0.1 D.IP:10.0.0.2 Network Transport 10.0.0.1 10.0.0.2 A B
26. Data flow -- Network Layer Data Data Data Segment Segment Packet Devices that work at Network Layer are Router, Multilayer switch etc.. NH Application Presentation Session Transport Network Data Link Physical
27.
28. Error Detection – CRC Check Hello! How are you ? Packet Source MAC 00-20-18-C0-07-71 Destination MAC 00-20-18-C0-07-72 00000 32434 22222 89696 55434 99323 43434 99434 46323 11114 33333 00000 32434 22222 89696 55434 99323 43434 99434 46323 11114 Error Detected PC-A CRC No. 33333 PC-B CRC No. 11114 Error Detected For Error Correction Contact Source Transport layer Packet 192.168.1.1 00-20-18-C0-07-71 192.168.1.2 00-20-18-C0-07-72 A B
29. Error Detection – CRC Check Packet Source MAC 00-20-18-C0-07-71 Destination MAC 00-20-18-C0-07-72 00000 32434 22222 89696 55434 99323 43434 99434 46323 11114 20202 00000 32434 22222 89696 55434 99323 43434 99434 46323 11114 20202 Source MAC 00-20-18-C0-07-71 Destination MAC 00-20-18-C0-07-72 Packet Packet Hello! How are you ? 192.168.1.1 00-20-18-C0-07-71 192.168.1.2 00-20-18-C0-07-72 A B
30. Data flow -- Data Link Layer Data Data Data Segment Packet Packet Packet Frame Devices that work at Data link layer are Switch, Bridge etc.. DH DT Application Presentation Session Transport Network Data Link Physical
31.
32. Physical Transmission of data Example: Frame 1010101010101010 1010101010101010 0101011010101010101010101 1010101101010101010101010 0101011010101010101010101 1010101101010101010101010 0101011010101010101010101 Frame Frame Hello! How are you ? A B
33. Data flow -- Physical Layer Data Data Data Segment Packet Frame Bits Devices that work at physical layer are .. Hub, Repeater.. Etc Application Presentation Session Transport Network Data Link Physical
34. Segment Packet Frame Packet Data Data Data Bits Data Segment Data Encapsulation & De-capsulation Packet Data Data Data Bits Segment Packet Frame A B Application Presentation Session Transport Network Data Link Physical Application Presentation Session Transport Network Data Link Physical DH DT NH TH DT Packet DH DT DH NH Segment NH TH Data TH Packet
35. Application Host-to-Host Internet Network Access Comparing OSI with TCP/IP Layers OSI Layers TCP/IP Layers Application Presentation Session Transport Network Data Link Physical
38. Example of FTP request ftp://ftp.microsoft.com Client FTP Server
39. Example of FTP request FTP Request ftp://ftp.microsoft.com FTP Request Listen on Port 21 Sending FTP Reply Received FTP Reply ftp://ftp.microsoft.com Client FTP Server