SharkFest ‘16 Computer History Museum June 13-16, 2016 SharkFest ‘16 Markers – Beacons in an Ocean of Packets Matthew York 15th June 2016 Performance &

Slides:



Advertisements
Similar presentations
Cryptography and Network Security
Advertisements

Secure Socket Layer.
Internet Security Protocols
Hands-On Ethical Hacking and Network Defense Lecture 15 Man in the Middle Attack to get Passwords from HTTPS Sessions.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
SSL Spoofing Man-In-The-Middle attack on SSL Duane Peifer.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Circuit & Application Level Gateways CS-431 Dick Steflik.
1 of 3 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Maintaining and Updating Windows Server 2008
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Chapter 7: Using Windows Servers to Share Information.
Bradley Cowie Supervised by Barry Irwin Security and Networks Research Group Department of Computer Science Rhodes University MANAGEMENT, PROCESSING AND.
Access Gateway Operation
Securing Microsoft® Exchange Server 2010
11 Copyright © 2005, Oracle. All rights reserved. Configuring the Oracle Network Environment.
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 12 Windows on the Internet.
By: Paul Hill Technology Coordinator Gwinn Area Community Schools.
Secure Socket Layer (SSL)
IT und TK Training Check Point Authentication Methods A short comparison.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Remote Access Using Citrix Presentation Server December 6, 2006 Matthew Granger IT665.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Integrating and Troubleshooting Citrix Access Gateway.
Homework 02 NAT 、 DHCP 、 Firewall 、 Proxy. Computer Center, CS, NCTU 2 Basic Knowledge  DHCP Dynamically assigning IPs to clients  NAT Translating addresses.
Networks Part 3: Packet Paths + Wireshark NYU-Poly: HSWP Instructor: Mandy Galante.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Monitoring Troubleshooting TCP/IP Chapter 3. Objectives for this Chapter Troubleshoot TCP/IP addressing Diagnose and resolve issues related to incorrect.
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
ArcGIS for Server Security: Advanced
Fundamental of Databases
Chapter 7: Using Windows Servers
Access Problems and Solutions for Full-text Articles or E-books
NAT、DHCP、Firewall、FTP、Proxy
Installing TMG & Choosing a Client Type
System Architecture & Hardware Configurations
CISC103 Web Development Basics: Web site:
Module Overview Installing and Configuring a Network Policy Server
Lesson 4: Web Browsing.
Securing the Network Perimeter with ISA 2004
Configuring and Troubleshooting Routing and Remote Access
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
CompTIA Server+ Certification (Exam SK0-004)
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Best Practices for Load Balancing Your GlobalSearch Installation
CISC103 Web Development Basics: Web site:
Access Problems and Solutions for Full-text Articles or E-books
Webscarab, an introduction.
SSL Protocol Figures used in the presentation
Cloud Web Filtering Platform
File Operations Access Permissions.
A Programmer’s Guide to Secure Connections
Lesson 4: Web Browsing.
Wireshark(Ethereal).
Transport Layer Security (TLS)
Designing IIS Security (IIS – Internet Information Service)
Office 365 Performance Management
Cryptography and Network Security
Presentation transcript:

SharkFest ‘16 Computer History Museum June 13-16, 2016 SharkFest ‘16 Markers – Beacons in an Ocean of Packets Matthew York 15th June 2016 Performance & Stability Consultant | Advance7

SharkFest ‘16 Computer History Museum June 13-16, 2016 Background Evidence based troubleshooting using RPR Analysing individual problem instances Types of problems: Incorrect or no response Slow response Frequency: Repeatable Intermittent

SharkFest ‘16 Computer History Museum June 13-16, 2016 Our (unoffical) motto

SharkFest ‘16 Computer History Museum June 13-16, 2016 What are we trying to acheive?

SharkFest ‘16 Computer History Museum June 13-16, 2016 Markers Markers help us troubleshoot by: 1.Identifying the problem timeframe 2.Inserting diagnostic information inline with captured data 3.Synchronising timestamps across multiple capture points and data sources 4.Giving users the ability to mark data without us being there

SharkFest ‘16 Computer History Museum June 13-16, 2016 The Approach Markers fit into each troubleshooting phase: 1.Plan and configure tools 2.Capture specific instances of problems 3.Analyse captured data Design Send Benefit

SharkFest ‘16 Computer History Museum June 13-16, 2016 The Marker Solution WAN ClientServer CP1 2 APPLICATION MARKER

SharkFest ‘16 Computer History Museum June 13-16, 2016 The Simplest Marker Ping Utility Send a single ICMP echo request of a set size Windows ping web01 –n 1 -l 100 Unix-like ping web01 –c 1 -s 100

SharkFest ‘16 Computer History Museum June 13-16, 2016 Ping example [start capture, browse website, send ping, find in trace, talk about batch ping]

SharkFest ‘16 Computer History Museum June 13-16, 2016 Limitations of Ping Markers Firewalls may drop ICMP packets They won‘t cross proxies or load balancers Policy restrictions may block tool Contain limited user information WAN ClientServer APPLICATION MARKER

SharkFest ‘16 Computer History Museum June 13-16, 2016 HTTP Markers WAN BrowserLoad Balancer CP1 2 HTTP MARKER Web Servers CP3 Send an HTTP GET Request to a specific URL.

SharkFest ‘16 Computer History Museum June 13-16, 2016 HTTP Transaction Components TCP Establishment HTTP Request HTTP Response TCP Tear-down Time Increasing [20:58:52] "GET /delay.php" 200 Web Log

SharkFest ‘16 Computer History Museum June 13-16, 2016 HTTP example [ browse website, manual send get, find in trace ]

SharkFest ‘16 Computer History Museum June 13-16, 2016 TribeLab Sonar Free tool for creating and sending markers Based on browser standards - HTML/JavaScript Create user friendly links for distribution to users Single page available for download tribelab.com/sonar

SharkFest ‘16 Computer History Museum June 13-16, 2016 Sonar example [ explain options, demonstrate, find in trace, show user version ]

SharkFest ‘16 Computer History Museum June 13-16, 2016 Mulitple Users & NAT WAN Terminal ServerLoad Balancer CP1 2 HTTP MARKER Web Servers CP3 APP SESSION ID = 1234

SharkFest ‘16 Computer History Museum June 13-16, 2016 Multiple User & NAT example [ find example ]

SharkFest ‘16 Computer History Museum June 13-16, 2016 Not Just Web Servers What happens if you aren’t analysing web traffic?

SharkFest ‘16 Computer History Museum June 13-16, 2016 SMB example [ display filters, find in bytes ]

SharkFest ‘16 Computer History Museum June 13-16, 2016 Encryption Two challenges: 1.How can we identify markers when we can’t see the payload? 2.How can we identify the our users encrypted streams in a multi-user / NAT environment?

SharkFest ‘16 Computer History Museum June 13-16, 2016 HTTPS Transaction Components TCP Establishment HTTP Request HTTP Response TCP Tear-down Time Increasing SSL Handshake

SharkFest ‘16 Computer History Museum June 13-16, 2016 Identifying encrypted markers example [ start captures, 30x redirects, response bytes ]

SharkFest ‘16 Computer History Museum June 13-16, 2016 SSL Handshake Client Hello Server Hello Certificate Server Key Exchange Certificate Request Server Hello Done Certificate Client Key Exchange Certificate Verify Change Cipher Spec Finished Change Cipher Spec Finished Application Data Client Hello Server Hello Change Cipher Spec Finished Change Cipher Spec Finished Application Data Full Abbreviated SESSION ID 0 ab27…

SharkFest ‘16 Computer History Museum June 13-16, 2016 Multi user encrypted example [ find by session id, web log correlation ]

SharkFest ‘16 Computer History Museum June 13-16, 2016 Benefits of HTTP Markers Marker will follow the path of application traffic Crafted to give additional diagnosis information No installation or special permissions needed Deploy link to users by Log correlation

SharkFest ‘16 Computer History Museum June 13-16, 2016 Summary Benefits & Uses Identify data for a problem instance Synchronise time between data sources Identify problem timeframe Not limited to the data sources mentioned here OS tracing such as ProcMon, SysDig, ETL SQL Logs

SharkFest ‘16 Computer History Museum June 13-16, 2016 TribeLab Workbench Workbench is an analysis productivity tool. Find markers over a group of files. Community Edition.

SharkFest ‘16 Computer History Museum June 13-16, 2016 Workbench example [ load files, find markers, open in Wireshark ]

SharkFest ‘16 Computer History Museum June 13-16, 2016 ?

RESOURCES Matthew York RPR TribeLab Sonar TribeLab Community