<?xml version="1.0" encoding="utf-8"?>
<!-- generator="" -->
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
	<title type="text">Network Protocol Analyzers</title>
	<subtitle type="text">Leading Network Security &amp; Cyber Security site. Cisco Routing/Switching, VPN, Microsoft, SASE, SSE, F5, PaloAlto Firewalls, Protocol Analysis, Tips &amp; more.</subtitle>
	<link rel="alternate" type="text/html" href="https://www.firewall.cx"/>
	<id>https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.feed</id>
	<updated>2026-04-11T12:46:45+10:00</updated>
	<author>
		<name>Firewall.cx Website</name>
	</author>
	<generator uri="https://www.joomla.org"></generator>
	<link rel="self" type="application/atom+xml" href="https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.feed?type=atom"/>
	<entry>
		<title>How to Perform TCP SYN Flood DoS Attack &amp; Detect it with Wireshark - Kali Linux hping3</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/performing-tcp-syn-flood-attack-and-detecting-it-with-wireshark.html"/>
		<published>2018-10-01T09:01:17+10:00</published>
		<updated>2018-10-01T09:01:17+10:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/performing-tcp-syn-flood-attack-and-detecting-it-with-wireshark.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/performing-detecting-syn-flood-attacks-wireshark/wireshark-logo.png&quot; alt=&quot;wireshark logo&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;wireshark logo&quot; /&gt;This article will help you &lt;strong&gt;understand TCP SYN Flood Attacks&lt;/strong&gt;, show &lt;strong&gt;how to perform a SYN Flood Attack (DoS attack) &lt;/strong&gt;using &lt;strong&gt;Kali Linux &amp;amp; hping3&lt;/strong&gt; and &lt;strong&gt;correctly identify&lt;/strong&gt; one using the &lt;strong&gt;Wireshark protocol analyser&lt;/strong&gt;. We’ve included all necessary screenshots and easy to follow instructions that will ensure an enjoyable learning experience for both beginners and advanced IT professionals.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;DoS attacks&lt;/strong&gt; are simple to carry out, can cause serious downtime, and aren’t always obvious. In a &lt;strong&gt;SYN&lt;/strong&gt;&lt;strong&gt; flood attack&lt;/strong&gt;, a malicious party exploits the &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html&quot; target=&quot;_blank&quot; title=&quot;TCP protocol&quot;&gt;&lt;strong&gt;TCP protocol&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; 3-way handshake&lt;/strong&gt; to quickly cause &lt;strong&gt;service and network disruptions&lt;/strong&gt;, ultimately leading to an &lt;strong&gt;Denial of Service (DoS) Attack&lt;/strong&gt;. These type of attacks can easily take admins by surprise and can become challenging to identify. Luckily tools like &lt;strong&gt;Wireshark &lt;/strong&gt;makes it an easy process to &lt;strong&gt;capture and verify any suspicions&lt;/strong&gt; of a &lt;strong&gt;DoS Attack&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Topics&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#how-tcp-syn-flood-attacks-work&quot; title=&quot;How TCP SYN Flood Attacks Work&quot;&gt;How TCP SYN Flood Attacks Work&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#how-to-perform-syn-flood-attack&quot; title=&quot;How to Perform a TCP SYN Flood Attack with Kali Linux &amp;amp; hping3&quot;&gt;How to Perform a TCP SYN Flood Attack with Kali Linux &amp;amp; hping3&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#how-to-detect-syn-flood-wireshark&quot; title=&quot;How to Detect a TCP SYN Flood Attack with Wireshark&quot;&gt;How to Detect a TCP SYN Flood Attack with Wireshark&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;There’s plenty of interesting information to cover so let’s get right into it.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;how-tcp-syn-flood-attacks-work&quot;&gt;How TCP SYN Flood Attacks Work&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When a client attempts to connect to a server using the &lt;strong&gt;TCP protocol&lt;/strong&gt; e.g (HTTP or HTTPS), it is first required to perform a &lt;strong&gt;three-way handshake&lt;/strong&gt; before any data is exchanged between the two. Since the &lt;strong&gt;three-way TCP handshake&lt;/strong&gt; is always initiated by the client it sends a &lt;strong&gt;SYN&lt;/strong&gt;&lt;strong&gt; packet&lt;/strong&gt; to the &lt;strong&gt;server&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/performing-detecting-syn-flood-attacks-wireshark/tcp-3-way-handshake.png&quot; alt=&quot;tcp 3 way handshake&quot; title=&quot;TCP 3-way handshake - TCP SYN flood attack&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The server next replies acknowledging the request and at the same time sends its own &lt;strong&gt;SYN request&lt;/strong&gt; – this is the &lt;strong&gt;SYN-ACK packet&lt;/strong&gt;. The finally the client sends an &lt;strong&gt;ACK packet&lt;/strong&gt; which confirms both two hosts agree to create a connection. The connection is therefore established and data can be transferred between them.&lt;/p&gt;
&lt;p class=&quot;box-hint&quot;&gt;Read our &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol/protocols-tcp-overview.html&quot; target=&quot;_blank&quot; title=&quot;TCP 3-Way Handshake process&quot;&gt;TCP Overview &lt;/a&gt;article for more information on the 3-way handshake&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In a &lt;strong&gt;SYN&lt;/strong&gt;&lt;strong&gt; flood&lt;/strong&gt;, the attacker sends a &lt;strong&gt;high volume of SYN packets&lt;/strong&gt; to the server using &lt;strong&gt;spoofed IP addresses&lt;/strong&gt; causing the server to send a reply (SYN-ACK) and leave its ports half-open, awaiting for a reply from a host that doesn’t exist:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/performing-detecting-syn-flood-attacks-wireshark/syn-flood-attack.png&quot; alt=&quot;Performing a TCP SYN flood attack&quot; title=&quot;Performing a TCP SYN flood attack&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In a simpler, direct attack (without IP spoofing), the attacker will simply use firewall rules to discard &lt;strong&gt;SYN-ACK packets&lt;/strong&gt; before they reach him. By flooding a target with &lt;strong&gt;SYN packets&lt;/strong&gt; and &lt;strong&gt;not responding&lt;/strong&gt; (&lt;strong&gt;ACK&lt;/strong&gt;), an attacker can easily overwhelm the target’s resources. In this state, the target struggles to handle traffic which in turn will &lt;strong&gt;increase CPU usage&lt;/strong&gt; and &lt;strong&gt;memory consumption&lt;/strong&gt; ultimately leading to the &lt;strong&gt;exhaustion&lt;/strong&gt; of its &lt;strong&gt;resources&lt;/strong&gt; (CPU and RAM). At this point the server will &lt;strong&gt;no longer be able to serve legitimate client requests&lt;/strong&gt; and ultimately lead to a &lt;strong&gt;Denial-of-Service&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;how-to-perform-syn-flood-attack&quot;&gt;How to Perform a TCP SYN Flood Attack with Kali Linux &amp;amp; hping3&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, to test if you can &lt;strong&gt;detect&lt;/strong&gt; this type of a &lt;strong&gt;DoS attack&lt;/strong&gt;, you must be able to perform one. The simplest way is via a &lt;a href=&quot;https://www.kali.org/&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Kali Linux Download&quot;&gt;Kali Linux&lt;/a&gt; and more specifically the &lt;a href=&quot;https://www.kali.org/tools/hping3/&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Hping3 with Kali Linux&quot;&gt;hping3&lt;/a&gt;, a popular &lt;strong&gt;TCP penetration testing tool&lt;/strong&gt; included in Kali Linux.&lt;/p&gt;
&lt;p&gt;Alternatively Linux users can install &lt;strong&gt;hping3&lt;/strong&gt; in their existing Linux distribution using the command:&lt;/p&gt;
&lt;p class=&quot;box-content&quot;&gt;# &lt;strong&gt;sudo apt-get install hping3&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In most cases, attackers will use &lt;strong&gt;hping&lt;/strong&gt; or another tool to spoof IP random addresses, so that’s what we’re going to focus on.&amp;nbsp; The line below lets us start and &lt;strong&gt;direct the SYN flood attack&lt;/strong&gt; to our target (192.168.1.159):&amp;nbsp;&lt;/p&gt;
&lt;p class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;#&lt;strong&gt; hping3 -c 15000 -d 120 -S -w 64 -p 80 --flood --rand-source 192.168.1.159&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/performing-detecting-syn-flood-attacks-wireshark/tcp-syn-flood-attack-with-kali-linux-hping3.png&quot; alt=&quot;&quot; title=&quot;tcp syn flood attack with kali linux hping3&quot; data-alt=&quot;tcp syn flood attack with kali linux hping3&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Let’s explain in detail the above command:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We’re sending &lt;strong&gt;15000 packets&lt;/strong&gt; (&lt;strong&gt;-c 15000&lt;/strong&gt;) at a size of &lt;strong&gt;120 bytes&lt;/strong&gt; (&lt;strong&gt;-d 120&lt;/strong&gt;) each. We’re specifying that the &lt;strong&gt;SYN Flag&lt;/strong&gt; (&lt;strong&gt;-S&lt;/strong&gt;) should be enabled, with a &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol/tcp-window-size-checksum.html&quot; target=&quot;_blank&quot; title=&quot;TCP Window Size&quot;&gt;&lt;strong&gt;TCP window size&lt;/strong&gt;&lt;/a&gt; of &lt;strong&gt;64&lt;/strong&gt; (&lt;strong&gt;-w 64&lt;/strong&gt;). To direct the attack to our victum’s HTTP web server we specify &lt;strong&gt;port 80&lt;/strong&gt; (&lt;strong&gt;-p 80&lt;/strong&gt;) and use the &lt;strong&gt;--flood&lt;/strong&gt; flag to send packets as fast as possible. As you’d expect, the &lt;strong&gt;--rand-source&lt;/strong&gt; flag generates spoofed IP addresses to disguise the real source and avoid detection but at the same time stop the victim’s &lt;strong&gt;SYN-ACK reply packets&lt;/strong&gt; from reaching the attacker.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;how-to-detect-syn-flood-wireshark&quot;&gt;How to Detect a SYN Flood Attack with Wireshark&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now the attack is in progress, we can attempt to detect it. &lt;strong&gt;Wireshark&lt;/strong&gt; is a little more involved than other commercial-grade software. However, it has the advantage of being completely free, open-source, and available on many platforms.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In our lab environment, we used a &lt;strong&gt;Kali Linux&lt;/strong&gt; laptop to target a &lt;strong&gt;Windows 10 desktop&lt;/strong&gt; via a network switch. Though the structure is insecure compared to many enterprise networks, an attacker could likely perform similar attacks after some sniffing. Recalling the &lt;strong&gt;hping3&lt;/strong&gt; command, we also used random IP addresses, as that’s the method attackers with some degree of knowledge will use.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Even so, &lt;strong&gt;SYN flood attacks&lt;/strong&gt; are quite easy to detect once you know what you’re looking for. As you’d expect, a big giveaway is the &lt;strong&gt;large&lt;/strong&gt;&lt;strong&gt; amount of SYN packets&lt;/strong&gt; being sent to our Windows 10 PC.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Straight away, though, admins should be able to note the start of the attack by a &lt;strong&gt;huge flood of TCP traffic&lt;/strong&gt;. We can &lt;strong&gt;filter for SYN packets&lt;/strong&gt; without an acknowledgment using the following filter: &amp;nbsp;&lt;strong&gt;tcp.flags.syn == 1 and tcp.flags.ack == 0&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/performing-detecting-syn-flood-attacks-wireshark/tcp-syn-flood-attack-detection-with-wireshark.png&quot; alt=&quot;tcp syn flood attack detection with wireshark&quot; title=&quot;tcp syn flood attack detection with wireshark&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As you can see, there’s a &lt;strong&gt;high volume of SYN packets &lt;/strong&gt;with very little variance in time. &lt;strong&gt;Each SYN packet&lt;/strong&gt; shows it’s from a &lt;strong&gt;different source IP address&lt;/strong&gt; with a &lt;strong&gt;destination port 80&lt;/strong&gt; (HTTP), &lt;strong&gt;identical length of 120 &lt;/strong&gt;and &lt;strong&gt;window size&lt;/strong&gt; (&lt;strong&gt;64&lt;/strong&gt;). When we filter with &lt;strong&gt;tcp.flags.syn == 1 and tcp.flags.ack == 1&lt;/strong&gt; we can see that the number of &lt;strong&gt;SYN/ACKs&lt;/strong&gt; is comparatively very small. A sure sign of a TCP SYN attack.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/performing-detecting-syn-flood-attacks-wireshark/tcp-syn-flood-attack-detection-with-wireshark-v2.png&quot; alt=&quot;tcp syn flood attack detection with wireshark&quot; title=&quot;tcp syn flood attack detection with wireshark&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We can also view &lt;strong&gt;Wireshark’s graphs&lt;/strong&gt; for a &lt;strong&gt;visual representation&lt;/strong&gt; of the uptick in traffic. The &lt;strong&gt;I/O graph&lt;/strong&gt; can be found via the &lt;strong&gt;Statistics&amp;gt;I/O Graph&lt;/strong&gt; menu. It shows a &lt;strong&gt;massive spike&lt;/strong&gt; in overall packets from near 0 to up to &lt;strong&gt;2400 packets a second&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/performing-detecting-syn-flood-attacks-wireshark/tcp-syn-flood-attack-wireshark-graph.png&quot; alt=&quot;tcp syn flood attack wireshark graph&quot; title=&quot;tcp syn flood attack wireshark graph&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By removing our filter and opening the &lt;strong&gt;protocol hierarchy statistics&lt;/strong&gt;, we can also see that there has been an &lt;strong&gt;unusually high volume of TCP packets&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/performing-detecting-syn-flood-attacks-wireshark/tcp-syn-flood-attack-wireshark-protocol-hierarchy-stats.png&quot; alt=&quot;tcp syn flood attack wireshark protocol hierarchy stats&quot; title=&quot;tcp syn flood attack wireshark protocol hierarchy stats&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;All of these metrics point to a &lt;strong&gt;SYN&lt;/strong&gt;&lt;strong&gt; flood attack&lt;/strong&gt; with little room for interpretation. By use of Wireshark, we can be certain there’s a malicious party and take steps to remedy the situation.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we showed &lt;strong&gt;how to perform a TCP SYN Flood DoS attack&lt;/strong&gt; with &lt;strong&gt;Kali Linux&lt;/strong&gt; (&lt;strong&gt;hping3&lt;/strong&gt;) and use the &lt;strong&gt;Wireshark network protocol analyser filters&lt;/strong&gt; to &lt;strong&gt;detect it&lt;/strong&gt;. We also explained the &lt;strong&gt;theory&lt;/strong&gt; behind &lt;strong&gt;TCP SYN flood attacks &lt;/strong&gt;and how they can cause &lt;strong&gt;Denial-of-Service attacks&lt;/strong&gt;.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/performing-detecting-syn-flood-attacks-wireshark/wireshark-logo.png&quot; alt=&quot;wireshark logo&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;wireshark logo&quot; /&gt;This article will help you &lt;strong&gt;understand TCP SYN Flood Attacks&lt;/strong&gt;, show &lt;strong&gt;how to perform a SYN Flood Attack (DoS attack) &lt;/strong&gt;using &lt;strong&gt;Kali Linux &amp;amp; hping3&lt;/strong&gt; and &lt;strong&gt;correctly identify&lt;/strong&gt; one using the &lt;strong&gt;Wireshark protocol analyser&lt;/strong&gt;. We’ve included all necessary screenshots and easy to follow instructions that will ensure an enjoyable learning experience for both beginners and advanced IT professionals.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;DoS attacks&lt;/strong&gt; are simple to carry out, can cause serious downtime, and aren’t always obvious. In a &lt;strong&gt;SYN&lt;/strong&gt;&lt;strong&gt; flood attack&lt;/strong&gt;, a malicious party exploits the &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html&quot; target=&quot;_blank&quot; title=&quot;TCP protocol&quot;&gt;&lt;strong&gt;TCP protocol&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; 3-way handshake&lt;/strong&gt; to quickly cause &lt;strong&gt;service and network disruptions&lt;/strong&gt;, ultimately leading to an &lt;strong&gt;Denial of Service (DoS) Attack&lt;/strong&gt;. These type of attacks can easily take admins by surprise and can become challenging to identify. Luckily tools like &lt;strong&gt;Wireshark &lt;/strong&gt;makes it an easy process to &lt;strong&gt;capture and verify any suspicions&lt;/strong&gt; of a &lt;strong&gt;DoS Attack&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Topics&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#how-tcp-syn-flood-attacks-work&quot; title=&quot;How TCP SYN Flood Attacks Work&quot;&gt;How TCP SYN Flood Attacks Work&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#how-to-perform-syn-flood-attack&quot; title=&quot;How to Perform a TCP SYN Flood Attack with Kali Linux &amp;amp; hping3&quot;&gt;How to Perform a TCP SYN Flood Attack with Kali Linux &amp;amp; hping3&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#how-to-detect-syn-flood-wireshark&quot; title=&quot;How to Detect a TCP SYN Flood Attack with Wireshark&quot;&gt;How to Detect a TCP SYN Flood Attack with Wireshark&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;There’s plenty of interesting information to cover so let’s get right into it.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;how-tcp-syn-flood-attacks-work&quot;&gt;How TCP SYN Flood Attacks Work&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When a client attempts to connect to a server using the &lt;strong&gt;TCP protocol&lt;/strong&gt; e.g (HTTP or HTTPS), it is first required to perform a &lt;strong&gt;three-way handshake&lt;/strong&gt; before any data is exchanged between the two. Since the &lt;strong&gt;three-way TCP handshake&lt;/strong&gt; is always initiated by the client it sends a &lt;strong&gt;SYN&lt;/strong&gt;&lt;strong&gt; packet&lt;/strong&gt; to the &lt;strong&gt;server&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/performing-detecting-syn-flood-attacks-wireshark/tcp-3-way-handshake.png&quot; alt=&quot;tcp 3 way handshake&quot; title=&quot;TCP 3-way handshake - TCP SYN flood attack&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The server next replies acknowledging the request and at the same time sends its own &lt;strong&gt;SYN request&lt;/strong&gt; – this is the &lt;strong&gt;SYN-ACK packet&lt;/strong&gt;. The finally the client sends an &lt;strong&gt;ACK packet&lt;/strong&gt; which confirms both two hosts agree to create a connection. The connection is therefore established and data can be transferred between them.&lt;/p&gt;
&lt;p class=&quot;box-hint&quot;&gt;Read our &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol/protocols-tcp-overview.html&quot; target=&quot;_blank&quot; title=&quot;TCP 3-Way Handshake process&quot;&gt;TCP Overview &lt;/a&gt;article for more information on the 3-way handshake&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In a &lt;strong&gt;SYN&lt;/strong&gt;&lt;strong&gt; flood&lt;/strong&gt;, the attacker sends a &lt;strong&gt;high volume of SYN packets&lt;/strong&gt; to the server using &lt;strong&gt;spoofed IP addresses&lt;/strong&gt; causing the server to send a reply (SYN-ACK) and leave its ports half-open, awaiting for a reply from a host that doesn’t exist:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/performing-detecting-syn-flood-attacks-wireshark/syn-flood-attack.png&quot; alt=&quot;Performing a TCP SYN flood attack&quot; title=&quot;Performing a TCP SYN flood attack&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In a simpler, direct attack (without IP spoofing), the attacker will simply use firewall rules to discard &lt;strong&gt;SYN-ACK packets&lt;/strong&gt; before they reach him. By flooding a target with &lt;strong&gt;SYN packets&lt;/strong&gt; and &lt;strong&gt;not responding&lt;/strong&gt; (&lt;strong&gt;ACK&lt;/strong&gt;), an attacker can easily overwhelm the target’s resources. In this state, the target struggles to handle traffic which in turn will &lt;strong&gt;increase CPU usage&lt;/strong&gt; and &lt;strong&gt;memory consumption&lt;/strong&gt; ultimately leading to the &lt;strong&gt;exhaustion&lt;/strong&gt; of its &lt;strong&gt;resources&lt;/strong&gt; (CPU and RAM). At this point the server will &lt;strong&gt;no longer be able to serve legitimate client requests&lt;/strong&gt; and ultimately lead to a &lt;strong&gt;Denial-of-Service&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;how-to-perform-syn-flood-attack&quot;&gt;How to Perform a TCP SYN Flood Attack with Kali Linux &amp;amp; hping3&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, to test if you can &lt;strong&gt;detect&lt;/strong&gt; this type of a &lt;strong&gt;DoS attack&lt;/strong&gt;, you must be able to perform one. The simplest way is via a &lt;a href=&quot;https://www.kali.org/&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Kali Linux Download&quot;&gt;Kali Linux&lt;/a&gt; and more specifically the &lt;a href=&quot;https://www.kali.org/tools/hping3/&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Hping3 with Kali Linux&quot;&gt;hping3&lt;/a&gt;, a popular &lt;strong&gt;TCP penetration testing tool&lt;/strong&gt; included in Kali Linux.&lt;/p&gt;
&lt;p&gt;Alternatively Linux users can install &lt;strong&gt;hping3&lt;/strong&gt; in their existing Linux distribution using the command:&lt;/p&gt;
&lt;p class=&quot;box-content&quot;&gt;# &lt;strong&gt;sudo apt-get install hping3&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In most cases, attackers will use &lt;strong&gt;hping&lt;/strong&gt; or another tool to spoof IP random addresses, so that’s what we’re going to focus on.&amp;nbsp; The line below lets us start and &lt;strong&gt;direct the SYN flood attack&lt;/strong&gt; to our target (192.168.1.159):&amp;nbsp;&lt;/p&gt;
&lt;p class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;#&lt;strong&gt; hping3 -c 15000 -d 120 -S -w 64 -p 80 --flood --rand-source 192.168.1.159&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/performing-detecting-syn-flood-attacks-wireshark/tcp-syn-flood-attack-with-kali-linux-hping3.png&quot; alt=&quot;&quot; title=&quot;tcp syn flood attack with kali linux hping3&quot; data-alt=&quot;tcp syn flood attack with kali linux hping3&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Let’s explain in detail the above command:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We’re sending &lt;strong&gt;15000 packets&lt;/strong&gt; (&lt;strong&gt;-c 15000&lt;/strong&gt;) at a size of &lt;strong&gt;120 bytes&lt;/strong&gt; (&lt;strong&gt;-d 120&lt;/strong&gt;) each. We’re specifying that the &lt;strong&gt;SYN Flag&lt;/strong&gt; (&lt;strong&gt;-S&lt;/strong&gt;) should be enabled, with a &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol/tcp-window-size-checksum.html&quot; target=&quot;_blank&quot; title=&quot;TCP Window Size&quot;&gt;&lt;strong&gt;TCP window size&lt;/strong&gt;&lt;/a&gt; of &lt;strong&gt;64&lt;/strong&gt; (&lt;strong&gt;-w 64&lt;/strong&gt;). To direct the attack to our victum’s HTTP web server we specify &lt;strong&gt;port 80&lt;/strong&gt; (&lt;strong&gt;-p 80&lt;/strong&gt;) and use the &lt;strong&gt;--flood&lt;/strong&gt; flag to send packets as fast as possible. As you’d expect, the &lt;strong&gt;--rand-source&lt;/strong&gt; flag generates spoofed IP addresses to disguise the real source and avoid detection but at the same time stop the victim’s &lt;strong&gt;SYN-ACK reply packets&lt;/strong&gt; from reaching the attacker.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;how-to-detect-syn-flood-wireshark&quot;&gt;How to Detect a SYN Flood Attack with Wireshark&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now the attack is in progress, we can attempt to detect it. &lt;strong&gt;Wireshark&lt;/strong&gt; is a little more involved than other commercial-grade software. However, it has the advantage of being completely free, open-source, and available on many platforms.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In our lab environment, we used a &lt;strong&gt;Kali Linux&lt;/strong&gt; laptop to target a &lt;strong&gt;Windows 10 desktop&lt;/strong&gt; via a network switch. Though the structure is insecure compared to many enterprise networks, an attacker could likely perform similar attacks after some sniffing. Recalling the &lt;strong&gt;hping3&lt;/strong&gt; command, we also used random IP addresses, as that’s the method attackers with some degree of knowledge will use.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Even so, &lt;strong&gt;SYN flood attacks&lt;/strong&gt; are quite easy to detect once you know what you’re looking for. As you’d expect, a big giveaway is the &lt;strong&gt;large&lt;/strong&gt;&lt;strong&gt; amount of SYN packets&lt;/strong&gt; being sent to our Windows 10 PC.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Straight away, though, admins should be able to note the start of the attack by a &lt;strong&gt;huge flood of TCP traffic&lt;/strong&gt;. We can &lt;strong&gt;filter for SYN packets&lt;/strong&gt; without an acknowledgment using the following filter: &amp;nbsp;&lt;strong&gt;tcp.flags.syn == 1 and tcp.flags.ack == 0&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/performing-detecting-syn-flood-attacks-wireshark/tcp-syn-flood-attack-detection-with-wireshark.png&quot; alt=&quot;tcp syn flood attack detection with wireshark&quot; title=&quot;tcp syn flood attack detection with wireshark&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As you can see, there’s a &lt;strong&gt;high volume of SYN packets &lt;/strong&gt;with very little variance in time. &lt;strong&gt;Each SYN packet&lt;/strong&gt; shows it’s from a &lt;strong&gt;different source IP address&lt;/strong&gt; with a &lt;strong&gt;destination port 80&lt;/strong&gt; (HTTP), &lt;strong&gt;identical length of 120 &lt;/strong&gt;and &lt;strong&gt;window size&lt;/strong&gt; (&lt;strong&gt;64&lt;/strong&gt;). When we filter with &lt;strong&gt;tcp.flags.syn == 1 and tcp.flags.ack == 1&lt;/strong&gt; we can see that the number of &lt;strong&gt;SYN/ACKs&lt;/strong&gt; is comparatively very small. A sure sign of a TCP SYN attack.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/performing-detecting-syn-flood-attacks-wireshark/tcp-syn-flood-attack-detection-with-wireshark-v2.png&quot; alt=&quot;tcp syn flood attack detection with wireshark&quot; title=&quot;tcp syn flood attack detection with wireshark&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We can also view &lt;strong&gt;Wireshark’s graphs&lt;/strong&gt; for a &lt;strong&gt;visual representation&lt;/strong&gt; of the uptick in traffic. The &lt;strong&gt;I/O graph&lt;/strong&gt; can be found via the &lt;strong&gt;Statistics&amp;gt;I/O Graph&lt;/strong&gt; menu. It shows a &lt;strong&gt;massive spike&lt;/strong&gt; in overall packets from near 0 to up to &lt;strong&gt;2400 packets a second&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/performing-detecting-syn-flood-attacks-wireshark/tcp-syn-flood-attack-wireshark-graph.png&quot; alt=&quot;tcp syn flood attack wireshark graph&quot; title=&quot;tcp syn flood attack wireshark graph&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By removing our filter and opening the &lt;strong&gt;protocol hierarchy statistics&lt;/strong&gt;, we can also see that there has been an &lt;strong&gt;unusually high volume of TCP packets&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/performing-detecting-syn-flood-attacks-wireshark/tcp-syn-flood-attack-wireshark-protocol-hierarchy-stats.png&quot; alt=&quot;tcp syn flood attack wireshark protocol hierarchy stats&quot; title=&quot;tcp syn flood attack wireshark protocol hierarchy stats&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;All of these metrics point to a &lt;strong&gt;SYN&lt;/strong&gt;&lt;strong&gt; flood attack&lt;/strong&gt; with little room for interpretation. By use of Wireshark, we can be certain there’s a malicious party and take steps to remedy the situation.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we showed &lt;strong&gt;how to perform a TCP SYN Flood DoS attack&lt;/strong&gt; with &lt;strong&gt;Kali Linux&lt;/strong&gt; (&lt;strong&gt;hping3&lt;/strong&gt;) and use the &lt;strong&gt;Wireshark network protocol analyser filters&lt;/strong&gt; to &lt;strong&gt;detect it&lt;/strong&gt;. We also explained the &lt;strong&gt;theory&lt;/strong&gt; behind &lt;strong&gt;TCP SYN flood attacks &lt;/strong&gt;and how they can cause &lt;strong&gt;Denial-of-Service attacks&lt;/strong&gt;.&lt;/p&gt;</content>
		<category term="Network Protocol Analyzers" />
	</entry>
	<entry>
		<title>How to Detect SYN Flood Attacks with Capsa Network Protocol Analyzer &amp; Create Automated Notification Alerts </title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/detecting-syn-flood-attacks-capsa-network-protocol-analyzer.html"/>
		<published>2018-09-18T22:40:03+10:00</published>
		<updated>2018-09-18T22:40:03+10:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/detecting-syn-flood-attacks-capsa-network-protocol-analyzer.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/network-hacker-syn-flood-attack.jpg&quot; alt=&quot;Network Hacker Executing a SYN Flood Attack&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Network Hacker Executing a SYN Flood Attack&quot; /&gt;&lt;/strong&gt;This article explains &lt;strong&gt;how to detect a SYN Flood Attack&lt;/strong&gt; using an &lt;strong&gt;advanced protocol analyser&lt;/strong&gt; like &lt;strong&gt;Colasoft Capsa&lt;/strong&gt;. We’ll show you how to &lt;strong&gt;identify and inspect abnormal traffic spikes&lt;/strong&gt;, &lt;strong&gt;drill into captured packets&lt;/strong&gt; and &lt;strong&gt;identify evidence of flood attacks&lt;/strong&gt;. Furthermore we’ll configure &lt;strong&gt;Colasoft Capsa&lt;/strong&gt; to &lt;strong&gt;automatically detect SYN Flood Attacks&lt;/strong&gt; and &lt;strong&gt;send automated &lt;/strong&gt;&lt;strong&gt;alert &lt;/strong&gt;&lt;strong&gt;notifications&lt;/strong&gt; .&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Denial-of-Service (DoS) attacks&lt;/strong&gt; are one of the most persistent attacks network admins face due to the ease they can be carried out. With a couple of commands, an attacker can create a &lt;strong&gt;DoS attack&lt;/strong&gt; capable of &lt;strong&gt;disrupting critical network services&lt;/strong&gt; within an organization.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are a number of ways to execute a &lt;strong&gt;DoS attack&lt;/strong&gt;, including &lt;strong&gt;ARP poisoning&lt;/strong&gt;, &lt;strong&gt;Ping Flood&lt;/strong&gt;, &lt;strong&gt;UDP Flood&lt;/strong&gt;, &lt;strong&gt;Smurf attack&lt;/strong&gt; and more but we’re going to focus on one of the most common: the &lt;strong&gt;SYN flood&lt;/strong&gt; (&lt;strong&gt;half-open attack&lt;/strong&gt;). In this method, an &lt;strong&gt;attacker exploits&lt;/strong&gt; the &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol/protocols-tcp-overview.html&quot; target=&quot;_blank&quot; title=&quot;TCP Handshake process&quot;&gt;&lt;strong&gt;TCP handshake process&lt;/strong&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In a regular &lt;strong&gt;three-way TCP handshake&lt;/strong&gt;, the user sends a &lt;strong&gt;SYN&lt;/strong&gt;&lt;strong&gt; packet&lt;/strong&gt; to a &lt;strong&gt;server&lt;/strong&gt;, which replies with a &lt;strong&gt;SYN-ACK&lt;/strong&gt;&lt;strong&gt; packet&lt;/strong&gt;. The user replies with a final &lt;strong&gt;ACK packet&lt;/strong&gt;, completing the process and &lt;strong&gt;establishing the TCP connection&lt;/strong&gt; be &lt;strong&gt;established&lt;/strong&gt; after which data can be transferred between the two hosts:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-3-way-handshake.png&quot; alt=&quot;tcp 3 way handshake&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;tcp 3 way handshake&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, if a server receives a &lt;strong&gt;high volume of SYN packets&lt;/strong&gt; and &lt;strong&gt;no replies&lt;/strong&gt; (&lt;strong&gt;ACK&lt;/strong&gt;) to its &lt;strong&gt;SYN-ACK packets&lt;/strong&gt;, the TCP connections remain &lt;strong&gt;half-open&lt;/strong&gt;, assuming natural network congestion:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/syn-flood-attack.png&quot; alt=&quot;syn flood attack&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;TCP SYN flood attack&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By flooding a target with &lt;strong&gt;SYN packets&lt;/strong&gt; and &lt;strong&gt;not responding&lt;/strong&gt; (&lt;strong&gt;ACK&lt;/strong&gt;), an attacker can easily overwhelm the target’s available ports. In this state, the target struggles to handle traffic which in turn will &lt;strong&gt;increase CPU usage&lt;/strong&gt; and &lt;strong&gt;memory consumption&lt;/strong&gt; ultimately leading to the &lt;strong&gt;exhaustion&lt;/strong&gt; of its &lt;strong&gt;resources&lt;/strong&gt; (CPU and RAM). At this point the server will &lt;strong&gt;no longer be able to serve legitimate clients requests&lt;/strong&gt; and ultimately lead to a &lt;strong&gt;Denial-of-Service&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Detecting &amp;amp; Investigating Unusual Network Traffic&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Fortunately, there are a number of software that can &lt;strong&gt;detect SYN Flood attacks&lt;/strong&gt;. &lt;strong&gt;Wireshark&lt;/strong&gt; is a strong, free solution, but paid versions of &lt;strong&gt;Colasoft Capsa&lt;/strong&gt; make it &lt;strong&gt;far easier and quicker&lt;/strong&gt; to &lt;strong&gt;detect&lt;/strong&gt; and &lt;strong&gt;locate network attacks&lt;/strong&gt;. Graph-oriented displays and clever features make it &lt;strong&gt;simple to diagnose issues&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As such, the first point of call for &lt;strong&gt;detecting a DoS attack&lt;/strong&gt; is the dashboard. The overview of your network will make spikes in traffic quickly noticeable. You should be able to notice an uptick in the &lt;strong&gt;global utilization graph&lt;/strong&gt;, as well as the &lt;strong&gt;total traffic by bytes&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-1-large.png&quot; class=&quot;jcepopup&quot; title=&quot;TCP SYN Flood Attack&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;TCP SYN Flood Attack&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-1-small.png&quot; alt=&quot;tcp syn flood attack packet analyzer dashboard&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;tcp syn flood attack packet analyzer dashboard&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, spikes in &lt;strong&gt;network utilization&lt;/strong&gt; can happen for many reasons, so it’s worth drilling down into the details. &lt;strong&gt;Capsa&lt;/strong&gt; makes this very easy via its &lt;strong&gt;Summary tab&lt;/strong&gt;, which will show &lt;strong&gt;packet size distribution&lt;/strong&gt;, &lt;strong&gt;TCP conversation count&lt;/strong&gt;, and &lt;strong&gt;TCP SYN/SYN-ACK sent&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this case, there’s an abnormal number of packets in the &lt;strong&gt;128-255 range&lt;/strong&gt;, but admins should look out for strange distributions under any heading as attackers can specify a packet size to suit their needs. However, a more telling picture emerges when looking at &lt;strong&gt;TCP SYN Sent&lt;/strong&gt;, which is almost &lt;strong&gt;4000 times that of SYN-ACK&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-2-large.png&quot; class=&quot;jcepopup&quot; title=&quot;tcp-syn-flood-attack&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;Identifying TCP SYN Flood Attack&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-2-small.png&quot; alt=&quot;tcp syn flood attack packet analysis&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;tcp syn flood attack packet analysis&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Clearly, there’s something wrong here, but it’s important to find the &lt;strong&gt;target&lt;/strong&gt; of the &lt;strong&gt;SYN packets&lt;/strong&gt; and their &lt;strong&gt;origin&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There a couple of ways to do this, but the &lt;strong&gt;TCP Conversation&lt;/strong&gt; tab is easiest. If we sort by &lt;strong&gt;TCP&lt;/strong&gt;, we can see that the same &lt;strong&gt;198-byte packet&lt;/strong&gt; is being sent to our &lt;strong&gt;victim PC&lt;/strong&gt; on &lt;strong&gt;port 80&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-packet-analysis-large.png&quot; class=&quot;jcepopup&quot; title=&quot;TCP Conversation Tab&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;SYN Flood Attack Identification - TCP Conversation Tab&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-packet-analysis-small.png&quot; alt=&quot;tcp syn flood attack packet analysis&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;tcp syn flood attack packet analysis&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;After &lt;strong&gt;selecting&lt;/strong&gt; one of these entries and &lt;strong&gt;decoding the packets&lt;/strong&gt;, you may see the results below. There have been &lt;strong&gt;repeated SYN packets&lt;/strong&gt; and the handshake isn’t performed normally in many cases:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-flow-analysis-large.png&quot; class=&quot;jcepopup&quot; title=&quot;Decoding TCP SYN Flood Packets&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;Decoding TCP SYN Flood Packets&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-flow-analysis-small.png&quot; alt=&quot;tcp syn flood flow analysis&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;tcp syn flood flow analysis&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The attack becomes most clear when viewing &lt;strong&gt;IP Conversation&lt;/strong&gt; in &lt;strong&gt;Capsa’s Matrix view&lt;/strong&gt;, which reveals thousands of packets sent to our victim PC from random IP addresses. This is due to the use of &lt;strong&gt;IP spoofing&lt;/strong&gt; to &lt;strong&gt;conceal their origin&lt;/strong&gt;. If the attacker isn’t using &lt;strong&gt;IP spoofing&lt;/strong&gt;, Capsa’s &lt;strong&gt;Resolve address&lt;/strong&gt; will be able to resolve the IP address and provide us with its name. If they are, finding the source is likely far more trouble than it’s worth:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-matrix-large.png&quot; class=&quot;jcepopup&quot; title=&quot;TCP SYN Flood - Matrix Conversation&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;TCP SYN Flood - Matrix Conversation&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-matrix-small.png&quot; alt=&quot;tcp syn flood attack matrix&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;tcp syn flood attack matrix&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At this point, we can be certain that an &lt;strong&gt;SYN flood attack&lt;/strong&gt; is taking place, but catching such attacks quickly really pays. Admins can use &lt;strong&gt;Capsa’s Alarm Explorer&lt;/strong&gt; to get an &lt;strong&gt;instant notification&lt;/strong&gt; when &lt;strong&gt;unusual traffic&lt;/strong&gt; is detected:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-alarm-creation.png&quot; alt=&quot;tcp syn flood attack alarm creation&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;tcp syn flood attack alarm creation&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A simple counter triggers a &lt;strong&gt;sound&lt;/strong&gt; and &lt;strong&gt;email&lt;/strong&gt; when a certain number of &lt;strong&gt;SYN packets per second are detected&lt;/strong&gt;. We set the counter to &lt;strong&gt;100&lt;/strong&gt; to test the functionality and Capsa immediately sent us an alert once we reached the configured threshold:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-alarm.png&quot; alt=&quot;tcp syn flood attack alarm&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;tcp syn flood attack alarm&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Capsa also lets users set up their &lt;strong&gt;own pane in the dashboard&lt;/strong&gt;, where you can display useful graphs like &lt;strong&gt;SYN sent vs SYN-ACK&lt;/strong&gt;, &lt;strong&gt;packet distribution&lt;/strong&gt;, and &lt;strong&gt;global utilization&lt;/strong&gt;. This should make it possible to &lt;strong&gt;check for &lt;/strong&gt;a SYN&lt;strong&gt; flood&lt;/strong&gt; at a glance when experiencing &lt;strong&gt;network slowdowns&lt;/strong&gt;:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-packet-analysis-dashboard.png&quot; alt=&quot;tcp syn flood attack packet analysis dashboard&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;tcp syn flood attack packet analysis dashboard&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Alternatively, &lt;strong&gt;Capsa’s Enterprise Edition&lt;/strong&gt; lets admins start a &lt;strong&gt;security analysis&lt;/strong&gt; profile, which contains a &lt;strong&gt;dedicated DoS attack tab&lt;/strong&gt;. This will automatically list victims of an &lt;strong&gt;SYN flood attack&lt;/strong&gt; and display useful statistics like &lt;strong&gt;TCP SYN received and sent&lt;/strong&gt;. It also allows for quick access to &lt;strong&gt;TCP conversation details&lt;/strong&gt;, letting admins &lt;strong&gt;decode quickly&lt;/strong&gt; and &lt;strong&gt;verify attacks&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-tab-large.png&quot; class=&quot;jcepopup&quot; title=&quot;TCP SYN Flood Attack Tab&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;TCP SYN Flood Attack Tab&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-tab-small.png&quot; alt=&quot;tcp syn flood attack tab&quot; title=&quot;tcp syn flood attack tab&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Click to enlarge&lt;/p&gt;
&lt;p&gt;Together, these techniques should be more than enough to &lt;strong&gt;catch SYN floods&lt;/strong&gt; as they start and prevent lengthy downtime.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article explained &lt;strong&gt;how SYN Flood Attacks work&lt;/strong&gt; and showed &lt;strong&gt;how to detect SYN Flood attacks using Colasoft Capsa&lt;/strong&gt;. We saw different ways to &lt;strong&gt;identify abnormal traffic spikes&lt;/strong&gt; within the network, how to &lt;strong&gt;drill into packets&lt;/strong&gt; and find &lt;strong&gt;evidence of possible attacks&lt;/strong&gt;. Finally we showed how &lt;strong&gt;Capsa&lt;/strong&gt; can be configured to &lt;strong&gt;automatically detect SYN Flood Attacks&lt;/strong&gt; and &lt;strong&gt;create alert notifications&lt;/strong&gt;.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/network-hacker-syn-flood-attack.jpg&quot; alt=&quot;Network Hacker Executing a SYN Flood Attack&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Network Hacker Executing a SYN Flood Attack&quot; /&gt;&lt;/strong&gt;This article explains &lt;strong&gt;how to detect a SYN Flood Attack&lt;/strong&gt; using an &lt;strong&gt;advanced protocol analyser&lt;/strong&gt; like &lt;strong&gt;Colasoft Capsa&lt;/strong&gt;. We’ll show you how to &lt;strong&gt;identify and inspect abnormal traffic spikes&lt;/strong&gt;, &lt;strong&gt;drill into captured packets&lt;/strong&gt; and &lt;strong&gt;identify evidence of flood attacks&lt;/strong&gt;. Furthermore we’ll configure &lt;strong&gt;Colasoft Capsa&lt;/strong&gt; to &lt;strong&gt;automatically detect SYN Flood Attacks&lt;/strong&gt; and &lt;strong&gt;send automated &lt;/strong&gt;&lt;strong&gt;alert &lt;/strong&gt;&lt;strong&gt;notifications&lt;/strong&gt; .&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Denial-of-Service (DoS) attacks&lt;/strong&gt; are one of the most persistent attacks network admins face due to the ease they can be carried out. With a couple of commands, an attacker can create a &lt;strong&gt;DoS attack&lt;/strong&gt; capable of &lt;strong&gt;disrupting critical network services&lt;/strong&gt; within an organization.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are a number of ways to execute a &lt;strong&gt;DoS attack&lt;/strong&gt;, including &lt;strong&gt;ARP poisoning&lt;/strong&gt;, &lt;strong&gt;Ping Flood&lt;/strong&gt;, &lt;strong&gt;UDP Flood&lt;/strong&gt;, &lt;strong&gt;Smurf attack&lt;/strong&gt; and more but we’re going to focus on one of the most common: the &lt;strong&gt;SYN flood&lt;/strong&gt; (&lt;strong&gt;half-open attack&lt;/strong&gt;). In this method, an &lt;strong&gt;attacker exploits&lt;/strong&gt; the &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol/protocols-tcp-overview.html&quot; target=&quot;_blank&quot; title=&quot;TCP Handshake process&quot;&gt;&lt;strong&gt;TCP handshake process&lt;/strong&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In a regular &lt;strong&gt;three-way TCP handshake&lt;/strong&gt;, the user sends a &lt;strong&gt;SYN&lt;/strong&gt;&lt;strong&gt; packet&lt;/strong&gt; to a &lt;strong&gt;server&lt;/strong&gt;, which replies with a &lt;strong&gt;SYN-ACK&lt;/strong&gt;&lt;strong&gt; packet&lt;/strong&gt;. The user replies with a final &lt;strong&gt;ACK packet&lt;/strong&gt;, completing the process and &lt;strong&gt;establishing the TCP connection&lt;/strong&gt; be &lt;strong&gt;established&lt;/strong&gt; after which data can be transferred between the two hosts:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-3-way-handshake.png&quot; alt=&quot;tcp 3 way handshake&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;tcp 3 way handshake&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, if a server receives a &lt;strong&gt;high volume of SYN packets&lt;/strong&gt; and &lt;strong&gt;no replies&lt;/strong&gt; (&lt;strong&gt;ACK&lt;/strong&gt;) to its &lt;strong&gt;SYN-ACK packets&lt;/strong&gt;, the TCP connections remain &lt;strong&gt;half-open&lt;/strong&gt;, assuming natural network congestion:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/syn-flood-attack.png&quot; alt=&quot;syn flood attack&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;TCP SYN flood attack&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By flooding a target with &lt;strong&gt;SYN packets&lt;/strong&gt; and &lt;strong&gt;not responding&lt;/strong&gt; (&lt;strong&gt;ACK&lt;/strong&gt;), an attacker can easily overwhelm the target’s available ports. In this state, the target struggles to handle traffic which in turn will &lt;strong&gt;increase CPU usage&lt;/strong&gt; and &lt;strong&gt;memory consumption&lt;/strong&gt; ultimately leading to the &lt;strong&gt;exhaustion&lt;/strong&gt; of its &lt;strong&gt;resources&lt;/strong&gt; (CPU and RAM). At this point the server will &lt;strong&gt;no longer be able to serve legitimate clients requests&lt;/strong&gt; and ultimately lead to a &lt;strong&gt;Denial-of-Service&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Detecting &amp;amp; Investigating Unusual Network Traffic&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Fortunately, there are a number of software that can &lt;strong&gt;detect SYN Flood attacks&lt;/strong&gt;. &lt;strong&gt;Wireshark&lt;/strong&gt; is a strong, free solution, but paid versions of &lt;strong&gt;Colasoft Capsa&lt;/strong&gt; make it &lt;strong&gt;far easier and quicker&lt;/strong&gt; to &lt;strong&gt;detect&lt;/strong&gt; and &lt;strong&gt;locate network attacks&lt;/strong&gt;. Graph-oriented displays and clever features make it &lt;strong&gt;simple to diagnose issues&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As such, the first point of call for &lt;strong&gt;detecting a DoS attack&lt;/strong&gt; is the dashboard. The overview of your network will make spikes in traffic quickly noticeable. You should be able to notice an uptick in the &lt;strong&gt;global utilization graph&lt;/strong&gt;, as well as the &lt;strong&gt;total traffic by bytes&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-1-large.png&quot; class=&quot;jcepopup&quot; title=&quot;TCP SYN Flood Attack&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;TCP SYN Flood Attack&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-1-small.png&quot; alt=&quot;tcp syn flood attack packet analyzer dashboard&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;tcp syn flood attack packet analyzer dashboard&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, spikes in &lt;strong&gt;network utilization&lt;/strong&gt; can happen for many reasons, so it’s worth drilling down into the details. &lt;strong&gt;Capsa&lt;/strong&gt; makes this very easy via its &lt;strong&gt;Summary tab&lt;/strong&gt;, which will show &lt;strong&gt;packet size distribution&lt;/strong&gt;, &lt;strong&gt;TCP conversation count&lt;/strong&gt;, and &lt;strong&gt;TCP SYN/SYN-ACK sent&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this case, there’s an abnormal number of packets in the &lt;strong&gt;128-255 range&lt;/strong&gt;, but admins should look out for strange distributions under any heading as attackers can specify a packet size to suit their needs. However, a more telling picture emerges when looking at &lt;strong&gt;TCP SYN Sent&lt;/strong&gt;, which is almost &lt;strong&gt;4000 times that of SYN-ACK&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-2-large.png&quot; class=&quot;jcepopup&quot; title=&quot;tcp-syn-flood-attack&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;Identifying TCP SYN Flood Attack&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-2-small.png&quot; alt=&quot;tcp syn flood attack packet analysis&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;tcp syn flood attack packet analysis&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Clearly, there’s something wrong here, but it’s important to find the &lt;strong&gt;target&lt;/strong&gt; of the &lt;strong&gt;SYN packets&lt;/strong&gt; and their &lt;strong&gt;origin&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There a couple of ways to do this, but the &lt;strong&gt;TCP Conversation&lt;/strong&gt; tab is easiest. If we sort by &lt;strong&gt;TCP&lt;/strong&gt;, we can see that the same &lt;strong&gt;198-byte packet&lt;/strong&gt; is being sent to our &lt;strong&gt;victim PC&lt;/strong&gt; on &lt;strong&gt;port 80&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-packet-analysis-large.png&quot; class=&quot;jcepopup&quot; title=&quot;TCP Conversation Tab&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;SYN Flood Attack Identification - TCP Conversation Tab&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-packet-analysis-small.png&quot; alt=&quot;tcp syn flood attack packet analysis&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;tcp syn flood attack packet analysis&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;After &lt;strong&gt;selecting&lt;/strong&gt; one of these entries and &lt;strong&gt;decoding the packets&lt;/strong&gt;, you may see the results below. There have been &lt;strong&gt;repeated SYN packets&lt;/strong&gt; and the handshake isn’t performed normally in many cases:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-flow-analysis-large.png&quot; class=&quot;jcepopup&quot; title=&quot;Decoding TCP SYN Flood Packets&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;Decoding TCP SYN Flood Packets&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-flow-analysis-small.png&quot; alt=&quot;tcp syn flood flow analysis&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;tcp syn flood flow analysis&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The attack becomes most clear when viewing &lt;strong&gt;IP Conversation&lt;/strong&gt; in &lt;strong&gt;Capsa’s Matrix view&lt;/strong&gt;, which reveals thousands of packets sent to our victim PC from random IP addresses. This is due to the use of &lt;strong&gt;IP spoofing&lt;/strong&gt; to &lt;strong&gt;conceal their origin&lt;/strong&gt;. If the attacker isn’t using &lt;strong&gt;IP spoofing&lt;/strong&gt;, Capsa’s &lt;strong&gt;Resolve address&lt;/strong&gt; will be able to resolve the IP address and provide us with its name. If they are, finding the source is likely far more trouble than it’s worth:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-matrix-large.png&quot; class=&quot;jcepopup&quot; title=&quot;TCP SYN Flood - Matrix Conversation&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;TCP SYN Flood - Matrix Conversation&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-matrix-small.png&quot; alt=&quot;tcp syn flood attack matrix&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;tcp syn flood attack matrix&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At this point, we can be certain that an &lt;strong&gt;SYN flood attack&lt;/strong&gt; is taking place, but catching such attacks quickly really pays. Admins can use &lt;strong&gt;Capsa’s Alarm Explorer&lt;/strong&gt; to get an &lt;strong&gt;instant notification&lt;/strong&gt; when &lt;strong&gt;unusual traffic&lt;/strong&gt; is detected:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-alarm-creation.png&quot; alt=&quot;tcp syn flood attack alarm creation&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;tcp syn flood attack alarm creation&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A simple counter triggers a &lt;strong&gt;sound&lt;/strong&gt; and &lt;strong&gt;email&lt;/strong&gt; when a certain number of &lt;strong&gt;SYN packets per second are detected&lt;/strong&gt;. We set the counter to &lt;strong&gt;100&lt;/strong&gt; to test the functionality and Capsa immediately sent us an alert once we reached the configured threshold:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-alarm.png&quot; alt=&quot;tcp syn flood attack alarm&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;tcp syn flood attack alarm&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Capsa also lets users set up their &lt;strong&gt;own pane in the dashboard&lt;/strong&gt;, where you can display useful graphs like &lt;strong&gt;SYN sent vs SYN-ACK&lt;/strong&gt;, &lt;strong&gt;packet distribution&lt;/strong&gt;, and &lt;strong&gt;global utilization&lt;/strong&gt;. This should make it possible to &lt;strong&gt;check for &lt;/strong&gt;a SYN&lt;strong&gt; flood&lt;/strong&gt; at a glance when experiencing &lt;strong&gt;network slowdowns&lt;/strong&gt;:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-packet-analysis-dashboard.png&quot; alt=&quot;tcp syn flood attack packet analysis dashboard&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;tcp syn flood attack packet analysis dashboard&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Alternatively, &lt;strong&gt;Capsa’s Enterprise Edition&lt;/strong&gt; lets admins start a &lt;strong&gt;security analysis&lt;/strong&gt; profile, which contains a &lt;strong&gt;dedicated DoS attack tab&lt;/strong&gt;. This will automatically list victims of an &lt;strong&gt;SYN flood attack&lt;/strong&gt; and display useful statistics like &lt;strong&gt;TCP SYN received and sent&lt;/strong&gt;. It also allows for quick access to &lt;strong&gt;TCP conversation details&lt;/strong&gt;, letting admins &lt;strong&gt;decode quickly&lt;/strong&gt; and &lt;strong&gt;verify attacks&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-tab-large.png&quot; class=&quot;jcepopup&quot; title=&quot;TCP SYN Flood Attack Tab&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;TCP SYN Flood Attack Tab&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/detecting-syn-flood-attacks-capsa/tcp-syn-flood-attack-tab-small.png&quot; alt=&quot;tcp syn flood attack tab&quot; title=&quot;tcp syn flood attack tab&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Click to enlarge&lt;/p&gt;
&lt;p&gt;Together, these techniques should be more than enough to &lt;strong&gt;catch SYN floods&lt;/strong&gt; as they start and prevent lengthy downtime.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article explained &lt;strong&gt;how SYN Flood Attacks work&lt;/strong&gt; and showed &lt;strong&gt;how to detect SYN Flood attacks using Colasoft Capsa&lt;/strong&gt;. We saw different ways to &lt;strong&gt;identify abnormal traffic spikes&lt;/strong&gt; within the network, how to &lt;strong&gt;drill into packets&lt;/strong&gt; and find &lt;strong&gt;evidence of possible attacks&lt;/strong&gt;. Finally we showed how &lt;strong&gt;Capsa&lt;/strong&gt; can be configured to &lt;strong&gt;automatically detect SYN Flood Attacks&lt;/strong&gt; and &lt;strong&gt;create alert notifications&lt;/strong&gt;.&lt;/p&gt;</content>
		<category term="Network Protocol Analyzers" />
	</entry>
	<entry>
		<title>Advanced Network Protocol Analyzer Review: Colasoft Capsa Enterprise 11</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/network-protocol-analyzer-review-capsa-enterprise-11.html"/>
		<published>2018-08-18T12:45:46+10:00</published>
		<updated>2018-08-18T12:45:46+10:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/network-protocol-analyzer-review-capsa-enterprise-11.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;Firewall.cx has covered Colasoft &lt;strong&gt;Capsa&lt;/strong&gt; several times in the past, but its constant improvements make it well worth revisiting. Since the last review, the version has bumped from &lt;strong&gt;7.6.1&lt;/strong&gt; to &lt;strong&gt;11.1.2+&lt;/strong&gt;, keeping a similar interface but scoring plenty of new features. In fact, its change is significant enough to warrant a full re-evaluation rather than a simple comparison.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For the unfamiliar, &lt;strong&gt;Colasoft Capsa Enterprise&lt;/strong&gt; is a widely respected &lt;strong&gt;network protocol analyzer&lt;/strong&gt; that goes far beyond &lt;strong&gt;free packet sniffers&lt;/strong&gt; like Wireshark. It gives users detailed information about &lt;strong&gt;packets&lt;/strong&gt;, &lt;strong&gt;conversations&lt;/strong&gt;, &lt;strong&gt;protocols&lt;/strong&gt;, and more, while also tying in diagnosis and &lt;strong&gt;security tools&lt;/strong&gt; to &lt;strong&gt;assess network health&lt;/strong&gt;. It was named as a visionary in &lt;strong&gt;Gartner’s Magic Quadrant for Network Performance Monitoring and Diagnostics in 2018&lt;/strong&gt;, which gives an idea of its power. Essentially, it’s a catch-all for professionals who want a deeper understanding of their network.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Installing Capsa Enterprise 11&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The installation of &lt;strong&gt;Capsa Enterprise&lt;/strong&gt; is a clear merit, requiring little to no additional configuration. The installer comes in at 84 MB, a very reasonable size that will be quick to download on most connections. From there, it’s a simple case of pressing &lt;strong&gt;Next&lt;/strong&gt; a few times.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, Colasoft does give additional options during the process. There’s the standard ability to choose the location of the install, but also choices of a &lt;strong&gt;Full&lt;/strong&gt;, &lt;strong&gt;Compact&lt;/strong&gt;, or &lt;strong&gt;Custom&lt;/strong&gt; install. It lets users remove parts of the network toolset as required to reduce clutter or any other issues. Naturally, Firewall.cx is looking at the full capabilities for the purpose of this review.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-installation-options.png&quot; alt=&quot;capsa enterprise v11 installation options&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 installation options&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The entire process takes only a few minutes, with Capsa automatically installing the necessary drivers. Capsa does prompt a restart after completion, though it can be accessed before then to register a serial number. The software offers both an online option for product registration and an offline process that makes use of a license file. It’s a nice touch that should appease the small percentage of users without a connection.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Using Capsa Enterprise 11&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;After starting Capsa Enterprise for the first time, users are presented with a dashboard that lets them choose a &lt;strong&gt;network adapter&lt;/strong&gt;, select an &lt;strong&gt;analysis profile&lt;/strong&gt;, or &lt;strong&gt;load packet files&lt;/strong&gt; for replay. Selecting an adapter reveals a graph of network usage over time to make it easier to discern the right one. A table above reveals the &lt;strong&gt;speed&lt;/strong&gt;, &lt;strong&gt;number of packets sent&lt;/strong&gt;, &lt;strong&gt;utilization&lt;/strong&gt;, and &lt;strong&gt;IP address&lt;/strong&gt; to make that process even easier.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-dashboard.png&quot; alt=&quot;capsa enterprise v11 protocol analyzer dashboard&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 protocol analyzer dashboard&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;However, it’s after pressing the &lt;strong&gt;Start&lt;/strong&gt; button that things get interesting. As data collection begins, Capsa starts to display it in a digestible way, revealing &lt;strong&gt;live graphs&lt;/strong&gt; with &lt;strong&gt;global utilization&lt;/strong&gt;, &lt;strong&gt;total traffic&lt;/strong&gt;, &lt;strong&gt;top IP addresses&lt;/strong&gt;, and &lt;strong&gt;top application protocols&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-dashboard-during-capture.png&quot; alt=&quot;capsa enterprise v11 dashboard during capture&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 dashboard during capture&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Users can customize this &lt;strong&gt;default screen&lt;/strong&gt; to display most of the information Capsa collects, from &lt;strong&gt;diagnoses&lt;/strong&gt; to &lt;strong&gt;HTTP requests&lt;/strong&gt;, &lt;strong&gt;security alarms&lt;/strong&gt;, &lt;strong&gt;DNS queries&lt;/strong&gt;, and more. Each can be adjusted to update at an interval from &lt;strong&gt;1 second&lt;/strong&gt; to &lt;strong&gt;1 hour&lt;/strong&gt;, with a choice between &lt;strong&gt;area&lt;/strong&gt;, &lt;strong&gt;line&lt;/strong&gt;, &lt;strong&gt;pie&lt;/strong&gt;, and &lt;strong&gt;bar charts&lt;/strong&gt;. The interface isn’t the most modern we’ve seen, but it’s hard to ask for more in terms of functionality.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Like previous versions, &lt;strong&gt;Capsa Enterprise 11&lt;/strong&gt; also presents several tabs and sub-tabs that provide deeper insights. A &lt;strong&gt;summary tab&lt;/strong&gt; gives a &lt;strong&gt;full statistical analysis&lt;/strong&gt; of &lt;strong&gt;network traffic&lt;/strong&gt; with &lt;strong&gt;detailed metadata&lt;/strong&gt;. A &lt;strong&gt;diagnosis tab&lt;/strong&gt; highlights issues your network is having on various layers, with logs for each fault or performance issue.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In fact, the &lt;strong&gt;diagnosis tab&lt;/strong&gt; deserves extra attention as it can also detect security issues. It’s a particular help with &lt;strong&gt;ARP poisoning attacks&lt;/strong&gt; due to counts of &lt;strong&gt;invalid ARP formats&lt;/strong&gt;, &lt;strong&gt;ARP request storms&lt;/strong&gt;, and &lt;strong&gt;ARP scans&lt;/strong&gt;. After &lt;strong&gt;clicking&lt;/strong&gt; on the &lt;strong&gt;alert&lt;/strong&gt;, admins can see the &lt;strong&gt;originating IP&lt;/strong&gt; and &lt;strong&gt;MAC address&lt;/strong&gt; and investigate.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-diagnosis-tab.png&quot; alt=&quot;capsa enterprise v11 diagnosis tab&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 diagnosis tab&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When &lt;strong&gt;clicking&lt;/strong&gt; on the &lt;strong&gt;alert&lt;/strong&gt;, Capsa also gives possible causes and resolutions, with the ability to set up an alarm in the future via sound or email. An &lt;strong&gt;alarm explorer&lt;/strong&gt; sub-menu also gives an overview of &lt;strong&gt;historic triggers&lt;/strong&gt; for later review. To reduce spam, you can adjust your alarms or filter specific errors out of the diagnosis system.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-analysis-profile-setting.png&quot; alt=&quot;capsa enterprise v11 analysis profile setting&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 analysis profile setting&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Naturally, this is a great help, and the ability to define such filters is present in every aspect of the software. You can &lt;strong&gt;filter&lt;/strong&gt; by &lt;strong&gt;IP&lt;/strong&gt;, &lt;strong&gt;MAC address&lt;/strong&gt;, and &lt;strong&gt;issue type&lt;/strong&gt;, as well as more &lt;strong&gt;complex filters&lt;/strong&gt;. Admins can remove &lt;strong&gt;specific traffic&lt;/strong&gt; either at capture or afterward. Under &lt;strong&gt;Packet Analysis&lt;/strong&gt;, for example, you can reject specific protocols like &lt;strong&gt;HTTP&lt;/strong&gt;, &lt;strong&gt;Broadcast&lt;/strong&gt;, &lt;strong&gt;ARP&lt;/strong&gt;, and &lt;strong&gt;Multicast&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-packet-analysis-filters.png&quot; alt=&quot;capsa enterprise v11 packet analysis filters&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 packet analysis filters&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you filter data you’ve already captured, it gets even more powerful, letting you craft filters for MAC addresses in specific protocols, or use an &lt;strong&gt;advanced flowchart system&lt;/strong&gt; to include certain time frames. The massive level of control makes it far easier to find what you’re looking for.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;After capture is complete, you can also hit the &lt;strong&gt;Conversation Filter&lt;/strong&gt; button, a powerful tool that lets you &lt;strong&gt;accept&lt;/strong&gt;/&lt;strong&gt;reject&lt;/strong&gt; data in the &lt;strong&gt;IP&lt;/strong&gt;, &lt;strong&gt;TCP&lt;/strong&gt;, and &lt;strong&gt;UDP Conversations&lt;/strong&gt; tabs. Again, it takes advantage of a &lt;strong&gt;node-based editor&lt;/strong&gt; plus &lt;strong&gt;AND&lt;/strong&gt;/&lt;strong&gt;OR&lt;/strong&gt;/&lt;strong&gt;NOT&lt;/strong&gt; &lt;strong&gt;operators&lt;/strong&gt; for easy creation. You can even export the filters for use on a different PC.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-adding-conversation-filter.png&quot; alt=&quot;capsa enterprise v11 adding conversation filter&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 adding conversation filter&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When you begin a capture with conversation filters active, Capsa will deliver a &lt;strong&gt;pop-up notification&lt;/strong&gt;. This is a small but very nice touch that should prevent users wondering why only certain protocols or locations are showing.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-packet-capture-filter-us-traffic.png&quot; alt=&quot;capsa enterprise v11 packet capture filter us traffic&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 packet capture filter us traffic&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once enabled, the filter will begin adjusting the data in the tab of the selected conversation type. Admins can then analyze at will, with the ability to filter by specific websites and look at detailed packet information.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-ip-conversation-tab.png&quot; alt=&quot;capsa enterprise v11 ip conversation tab&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 ip conversation tab&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The packet analysis window gives access to further filters, including &lt;strong&gt;address&lt;/strong&gt;, &lt;strong&gt;port&lt;/strong&gt;, &lt;strong&gt;protocol&lt;/strong&gt;, &lt;strong&gt;size&lt;/strong&gt;, &lt;strong&gt;pattern&lt;/strong&gt;, &lt;strong&gt;time&lt;/strong&gt;, and &lt;strong&gt;value&lt;/strong&gt;. You can also hit &lt;strong&gt;Ctrl+F&lt;/strong&gt; to search for specific strings in &lt;strong&gt;ASCII&lt;/strong&gt;, &lt;strong&gt;HEX&lt;/strong&gt;, and &lt;strong&gt;UTF&lt;/strong&gt;, with the ability to choose between three layout options.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-packet-capture-filter-analysis.png&quot; alt=&quot;capsa enterprise v11 packet capture filter analysis&quot; title=&quot;capsa enterprise v11 packet capture filter analysis&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, though most of your time will be spent in Capsa’s various details, its toolbar is worth a mention. Again, there’s a tabbed interface, the default being &lt;strong&gt;Analysis&lt;/strong&gt;. Here you’ll see buttons to &lt;strong&gt;stop&lt;/strong&gt; and &lt;strong&gt;start capture&lt;/strong&gt;, &lt;strong&gt;view node groups&lt;/strong&gt;, &lt;strong&gt;set alarms&lt;/strong&gt; for certain diagnoses, &lt;strong&gt;set filters&lt;/strong&gt;, and customize the UI.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-dashboard-v2.png&quot; alt=&quot;capsa enterprise v11 dashboard v2&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 dashboard&quot; /&gt;&lt;/p&gt;
&lt;p&gt;However, most admins will find themselves glancing at it for its &lt;strong&gt;pps&lt;/strong&gt;, &lt;strong&gt;bps&lt;/strong&gt;, and &lt;strong&gt;utilisation statistics&lt;/strong&gt;. These update every &lt;strong&gt;second&lt;/strong&gt; and mean you can get a &lt;strong&gt;quick overview&lt;/strong&gt; no matter what screen you’re on. It combines with a clever &lt;strong&gt;grid-based display&lt;/strong&gt; for &lt;strong&gt;packet buffer&lt;/strong&gt;, which can be quickly exported for use in other software’s or replays.&lt;/p&gt;
&lt;p&gt;Another important section is the &lt;strong&gt;Tools&lt;/strong&gt; tab, which gives access to Capsa’s &lt;strong&gt;Base64 Codec&lt;/strong&gt;, &lt;strong&gt;Ping&lt;/strong&gt;, &lt;strong&gt;Packet Player&lt;/strong&gt;, &lt;strong&gt;Packet Builder&lt;/strong&gt;, and &lt;strong&gt;MAC Scanner&lt;/strong&gt; applications. These can also be accessed via the &lt;strong&gt;file menu&lt;/strong&gt; in the top left but having them for quick access is a nice touch.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-tools.png&quot; alt=&quot;capsa enterprise v11 tools&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 tools&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, a &lt;strong&gt;Views &lt;/strong&gt;tab gives very useful and quick access to a number of display modes. These enable panels like the &lt;strong&gt;alarm view&lt;/strong&gt; and let you switch between important options like &lt;strong&gt;IP&lt;/strong&gt;/&lt;strong&gt;MAC address&lt;/strong&gt; only or &lt;strong&gt;name only&lt;/strong&gt; modes.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-views-tab.png&quot; alt=&quot;capsa enterprise v11 views tab&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 views tab&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;In general, Colosoft has done a great job of packing a lot of information into one application while keeping it customizable. However, there are some areas where it really shines, and its &lt;strong&gt;Matrix&lt;/strong&gt; tab is one of those. With a single click, you can get a visual overview of much of the conversations on a network, with &lt;strong&gt;Top 100 MAC&lt;/strong&gt;, &lt;strong&gt;MAC Node&lt;/strong&gt;, &lt;strong&gt;IP Conversation&lt;/strong&gt;, and &lt;strong&gt;IP Node&lt;/strong&gt; views:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-top-100-mac-matrix.png&quot; alt=&quot;capsa enterprise v11 top 100 mac matrix&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 top 100 mac matrix&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Firewall.cx has praised this feature before and it remains a strong highlight of the software. Admins are able to move the lines of the diagrams around at will for clarity, click on each address to view the related packets, and quickly make filters via a right click interface.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-matrix.png&quot; alt=&quot;capsa enterprise v11 matrix&quot; title=&quot;capsa enterprise v11 matrix&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The information above is from a single PC, so you can imagine how useful it gets once more devices are introduced. You can select individual IP addresses in the node explorer on the left-hand side to get a quick overview of their &lt;strong&gt;IP&lt;/strong&gt; and &lt;strong&gt;MAC conversations&lt;/strong&gt;, with the ability to customize the &lt;strong&gt;Matrix&lt;/strong&gt; for a higher &lt;strong&gt;maximum node number&lt;/strong&gt;, &lt;strong&gt;traffic types&lt;/strong&gt;, and &lt;strong&gt;value&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-modify-matrix.png&quot; alt=&quot;capsa enterprise v11 modify matrix&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 modify matrix&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Thanks to its&lt;strong&gt; v7.8&lt;/strong&gt; update, Capsa also has support for detailed &lt;strong&gt;VoIP Analysis&lt;/strong&gt;. Users can configure &lt;strong&gt;RTP&lt;/strong&gt; via the &lt;strong&gt;System&amp;gt;Decoder&lt;/strong&gt; menu, with support for multiple sources and destination addresses, encoding types, and ports.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-rtp-system-decoder.png&quot; alt=&quot;capsa enterprise v11 rtp system decoder&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 rtp system decoder&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once everything is configured correctly, admins will begin to see the &lt;strong&gt;VoIP Call&lt;/strong&gt; tab populate useful information. A summary tab shows &lt;strong&gt;MOS_A/V distribution&lt;/strong&gt; with ratings between &lt;strong&gt;Good&lt;/strong&gt; (4.24-5.00) and &lt;strong&gt;Bad&lt;/strong&gt; (0.00-3.59). A status column shows &lt;strong&gt;success&lt;/strong&gt;, &lt;strong&gt;failure&lt;/strong&gt;, and &lt;strong&gt;rejection&lt;/strong&gt;, and a &lt;strong&gt;diagnosis tab&lt;/strong&gt; keeps count of &lt;strong&gt;setup times&lt;/strong&gt;, &lt;strong&gt;bandwidth rejects&lt;/strong&gt;, and more. While our test environment didn't contain VoIP traffic we still included the screesnhot below to help give readers the full picture.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-voip-traffic-analysis.png&quot; alt=&quot;capsa enterprise v11 voip traffic analysis&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 voip traffic analysis&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In addition, a window below keeps track of &lt;strong&gt;packets&lt;/strong&gt;, &lt;strong&gt;bytes&lt;/strong&gt;, &lt;strong&gt;utilization&lt;/strong&gt;, and &lt;strong&gt;average throughput&lt;/strong&gt;, as well as various statistics. Finally, the &lt;strong&gt;Call&lt;/strong&gt; tab lists &lt;strong&gt;numbers&lt;/strong&gt; and &lt;strong&gt;endpoints&lt;/strong&gt;, alongside their &lt;strong&gt;jitter&lt;/strong&gt;, &lt;strong&gt;packet loss&lt;/strong&gt;, &lt;strong&gt;codec&lt;/strong&gt;, and more. Like most aspects of Capsa, this data can be exported or turned into a custom report from within the software.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Capsa Enterprise 11&lt;/strong&gt; creates a number of these reports by default. A global report gives an overview of total traffic with &lt;strong&gt;MAC address counts&lt;/strong&gt;, &lt;strong&gt;protocol counts&lt;/strong&gt;, &lt;strong&gt;top MAC/IP addresses&lt;/strong&gt;, and more. There are also separate auto-generated reports for &lt;strong&gt;VoIP&lt;/strong&gt;, &lt;strong&gt;Conversation&lt;/strong&gt;, &lt;strong&gt;Top Traffic&lt;/strong&gt;, &lt;strong&gt;Port&lt;/strong&gt;, and &lt;strong&gt;Packet&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-reporting-capabilities.png&quot; alt=&quot;capsa enterprise v11 reporting capabilities&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 reporting capabilities&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You can customize these with &lt;strong&gt;logo&lt;/strong&gt; and &lt;strong&gt;author name&lt;/strong&gt;, but they’re missing many of the features you’d see in advanced reporting software. There’s no option for a pie chart, for example, though they can be created via the node explorer and saved as an image.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Conclusion&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Capsa Enterprise 11&lt;/strong&gt; is a testament to Colasoft’s consistent improvements over the years. It has very few compromises, refusing to skimp on features while still maintaining ease of use. Capsa comes in two different flavors – &lt;strong&gt;Enterprise version&lt;/strong&gt; or the &lt;strong&gt;Standard version&lt;/strong&gt;, making it an &lt;strong&gt;extremely affordable&lt;/strong&gt; &amp;amp; &lt;strong&gt;robust toolset&lt;/strong&gt; with the ability to &lt;strong&gt;reduce&lt;/strong&gt; the &lt;strong&gt;downtime&lt;/strong&gt; and make &lt;strong&gt;troubleshooting&lt;/strong&gt; an &lt;strong&gt;enjoyable process&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Though its visual design and report features look somewhat dated, the layout is incredibly effective. Admins will spend much of their time in the &lt;strong&gt;matrix view&lt;/strong&gt; but can also make use of very specific filters to deliver only the data they want. It got the &lt;strong&gt;Firewall.cx seal of approval&lt;/strong&gt; last time it was reviewed, and we feel comfortable giving it again.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;Firewall.cx has covered Colasoft &lt;strong&gt;Capsa&lt;/strong&gt; several times in the past, but its constant improvements make it well worth revisiting. Since the last review, the version has bumped from &lt;strong&gt;7.6.1&lt;/strong&gt; to &lt;strong&gt;11.1.2+&lt;/strong&gt;, keeping a similar interface but scoring plenty of new features. In fact, its change is significant enough to warrant a full re-evaluation rather than a simple comparison.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For the unfamiliar, &lt;strong&gt;Colasoft Capsa Enterprise&lt;/strong&gt; is a widely respected &lt;strong&gt;network protocol analyzer&lt;/strong&gt; that goes far beyond &lt;strong&gt;free packet sniffers&lt;/strong&gt; like Wireshark. It gives users detailed information about &lt;strong&gt;packets&lt;/strong&gt;, &lt;strong&gt;conversations&lt;/strong&gt;, &lt;strong&gt;protocols&lt;/strong&gt;, and more, while also tying in diagnosis and &lt;strong&gt;security tools&lt;/strong&gt; to &lt;strong&gt;assess network health&lt;/strong&gt;. It was named as a visionary in &lt;strong&gt;Gartner’s Magic Quadrant for Network Performance Monitoring and Diagnostics in 2018&lt;/strong&gt;, which gives an idea of its power. Essentially, it’s a catch-all for professionals who want a deeper understanding of their network.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Installing Capsa Enterprise 11&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The installation of &lt;strong&gt;Capsa Enterprise&lt;/strong&gt; is a clear merit, requiring little to no additional configuration. The installer comes in at 84 MB, a very reasonable size that will be quick to download on most connections. From there, it’s a simple case of pressing &lt;strong&gt;Next&lt;/strong&gt; a few times.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, Colasoft does give additional options during the process. There’s the standard ability to choose the location of the install, but also choices of a &lt;strong&gt;Full&lt;/strong&gt;, &lt;strong&gt;Compact&lt;/strong&gt;, or &lt;strong&gt;Custom&lt;/strong&gt; install. It lets users remove parts of the network toolset as required to reduce clutter or any other issues. Naturally, Firewall.cx is looking at the full capabilities for the purpose of this review.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-installation-options.png&quot; alt=&quot;capsa enterprise v11 installation options&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 installation options&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The entire process takes only a few minutes, with Capsa automatically installing the necessary drivers. Capsa does prompt a restart after completion, though it can be accessed before then to register a serial number. The software offers both an online option for product registration and an offline process that makes use of a license file. It’s a nice touch that should appease the small percentage of users without a connection.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Using Capsa Enterprise 11&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;After starting Capsa Enterprise for the first time, users are presented with a dashboard that lets them choose a &lt;strong&gt;network adapter&lt;/strong&gt;, select an &lt;strong&gt;analysis profile&lt;/strong&gt;, or &lt;strong&gt;load packet files&lt;/strong&gt; for replay. Selecting an adapter reveals a graph of network usage over time to make it easier to discern the right one. A table above reveals the &lt;strong&gt;speed&lt;/strong&gt;, &lt;strong&gt;number of packets sent&lt;/strong&gt;, &lt;strong&gt;utilization&lt;/strong&gt;, and &lt;strong&gt;IP address&lt;/strong&gt; to make that process even easier.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-dashboard.png&quot; alt=&quot;capsa enterprise v11 protocol analyzer dashboard&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 protocol analyzer dashboard&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;However, it’s after pressing the &lt;strong&gt;Start&lt;/strong&gt; button that things get interesting. As data collection begins, Capsa starts to display it in a digestible way, revealing &lt;strong&gt;live graphs&lt;/strong&gt; with &lt;strong&gt;global utilization&lt;/strong&gt;, &lt;strong&gt;total traffic&lt;/strong&gt;, &lt;strong&gt;top IP addresses&lt;/strong&gt;, and &lt;strong&gt;top application protocols&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-dashboard-during-capture.png&quot; alt=&quot;capsa enterprise v11 dashboard during capture&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 dashboard during capture&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Users can customize this &lt;strong&gt;default screen&lt;/strong&gt; to display most of the information Capsa collects, from &lt;strong&gt;diagnoses&lt;/strong&gt; to &lt;strong&gt;HTTP requests&lt;/strong&gt;, &lt;strong&gt;security alarms&lt;/strong&gt;, &lt;strong&gt;DNS queries&lt;/strong&gt;, and more. Each can be adjusted to update at an interval from &lt;strong&gt;1 second&lt;/strong&gt; to &lt;strong&gt;1 hour&lt;/strong&gt;, with a choice between &lt;strong&gt;area&lt;/strong&gt;, &lt;strong&gt;line&lt;/strong&gt;, &lt;strong&gt;pie&lt;/strong&gt;, and &lt;strong&gt;bar charts&lt;/strong&gt;. The interface isn’t the most modern we’ve seen, but it’s hard to ask for more in terms of functionality.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Like previous versions, &lt;strong&gt;Capsa Enterprise 11&lt;/strong&gt; also presents several tabs and sub-tabs that provide deeper insights. A &lt;strong&gt;summary tab&lt;/strong&gt; gives a &lt;strong&gt;full statistical analysis&lt;/strong&gt; of &lt;strong&gt;network traffic&lt;/strong&gt; with &lt;strong&gt;detailed metadata&lt;/strong&gt;. A &lt;strong&gt;diagnosis tab&lt;/strong&gt; highlights issues your network is having on various layers, with logs for each fault or performance issue.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In fact, the &lt;strong&gt;diagnosis tab&lt;/strong&gt; deserves extra attention as it can also detect security issues. It’s a particular help with &lt;strong&gt;ARP poisoning attacks&lt;/strong&gt; due to counts of &lt;strong&gt;invalid ARP formats&lt;/strong&gt;, &lt;strong&gt;ARP request storms&lt;/strong&gt;, and &lt;strong&gt;ARP scans&lt;/strong&gt;. After &lt;strong&gt;clicking&lt;/strong&gt; on the &lt;strong&gt;alert&lt;/strong&gt;, admins can see the &lt;strong&gt;originating IP&lt;/strong&gt; and &lt;strong&gt;MAC address&lt;/strong&gt; and investigate.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-diagnosis-tab.png&quot; alt=&quot;capsa enterprise v11 diagnosis tab&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 diagnosis tab&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When &lt;strong&gt;clicking&lt;/strong&gt; on the &lt;strong&gt;alert&lt;/strong&gt;, Capsa also gives possible causes and resolutions, with the ability to set up an alarm in the future via sound or email. An &lt;strong&gt;alarm explorer&lt;/strong&gt; sub-menu also gives an overview of &lt;strong&gt;historic triggers&lt;/strong&gt; for later review. To reduce spam, you can adjust your alarms or filter specific errors out of the diagnosis system.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-analysis-profile-setting.png&quot; alt=&quot;capsa enterprise v11 analysis profile setting&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 analysis profile setting&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Naturally, this is a great help, and the ability to define such filters is present in every aspect of the software. You can &lt;strong&gt;filter&lt;/strong&gt; by &lt;strong&gt;IP&lt;/strong&gt;, &lt;strong&gt;MAC address&lt;/strong&gt;, and &lt;strong&gt;issue type&lt;/strong&gt;, as well as more &lt;strong&gt;complex filters&lt;/strong&gt;. Admins can remove &lt;strong&gt;specific traffic&lt;/strong&gt; either at capture or afterward. Under &lt;strong&gt;Packet Analysis&lt;/strong&gt;, for example, you can reject specific protocols like &lt;strong&gt;HTTP&lt;/strong&gt;, &lt;strong&gt;Broadcast&lt;/strong&gt;, &lt;strong&gt;ARP&lt;/strong&gt;, and &lt;strong&gt;Multicast&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-packet-analysis-filters.png&quot; alt=&quot;capsa enterprise v11 packet analysis filters&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 packet analysis filters&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you filter data you’ve already captured, it gets even more powerful, letting you craft filters for MAC addresses in specific protocols, or use an &lt;strong&gt;advanced flowchart system&lt;/strong&gt; to include certain time frames. The massive level of control makes it far easier to find what you’re looking for.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;After capture is complete, you can also hit the &lt;strong&gt;Conversation Filter&lt;/strong&gt; button, a powerful tool that lets you &lt;strong&gt;accept&lt;/strong&gt;/&lt;strong&gt;reject&lt;/strong&gt; data in the &lt;strong&gt;IP&lt;/strong&gt;, &lt;strong&gt;TCP&lt;/strong&gt;, and &lt;strong&gt;UDP Conversations&lt;/strong&gt; tabs. Again, it takes advantage of a &lt;strong&gt;node-based editor&lt;/strong&gt; plus &lt;strong&gt;AND&lt;/strong&gt;/&lt;strong&gt;OR&lt;/strong&gt;/&lt;strong&gt;NOT&lt;/strong&gt; &lt;strong&gt;operators&lt;/strong&gt; for easy creation. You can even export the filters for use on a different PC.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-adding-conversation-filter.png&quot; alt=&quot;capsa enterprise v11 adding conversation filter&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 adding conversation filter&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When you begin a capture with conversation filters active, Capsa will deliver a &lt;strong&gt;pop-up notification&lt;/strong&gt;. This is a small but very nice touch that should prevent users wondering why only certain protocols or locations are showing.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-packet-capture-filter-us-traffic.png&quot; alt=&quot;capsa enterprise v11 packet capture filter us traffic&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 packet capture filter us traffic&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once enabled, the filter will begin adjusting the data in the tab of the selected conversation type. Admins can then analyze at will, with the ability to filter by specific websites and look at detailed packet information.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-ip-conversation-tab.png&quot; alt=&quot;capsa enterprise v11 ip conversation tab&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 ip conversation tab&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The packet analysis window gives access to further filters, including &lt;strong&gt;address&lt;/strong&gt;, &lt;strong&gt;port&lt;/strong&gt;, &lt;strong&gt;protocol&lt;/strong&gt;, &lt;strong&gt;size&lt;/strong&gt;, &lt;strong&gt;pattern&lt;/strong&gt;, &lt;strong&gt;time&lt;/strong&gt;, and &lt;strong&gt;value&lt;/strong&gt;. You can also hit &lt;strong&gt;Ctrl+F&lt;/strong&gt; to search for specific strings in &lt;strong&gt;ASCII&lt;/strong&gt;, &lt;strong&gt;HEX&lt;/strong&gt;, and &lt;strong&gt;UTF&lt;/strong&gt;, with the ability to choose between three layout options.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-packet-capture-filter-analysis.png&quot; alt=&quot;capsa enterprise v11 packet capture filter analysis&quot; title=&quot;capsa enterprise v11 packet capture filter analysis&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, though most of your time will be spent in Capsa’s various details, its toolbar is worth a mention. Again, there’s a tabbed interface, the default being &lt;strong&gt;Analysis&lt;/strong&gt;. Here you’ll see buttons to &lt;strong&gt;stop&lt;/strong&gt; and &lt;strong&gt;start capture&lt;/strong&gt;, &lt;strong&gt;view node groups&lt;/strong&gt;, &lt;strong&gt;set alarms&lt;/strong&gt; for certain diagnoses, &lt;strong&gt;set filters&lt;/strong&gt;, and customize the UI.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-dashboard-v2.png&quot; alt=&quot;capsa enterprise v11 dashboard v2&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 dashboard&quot; /&gt;&lt;/p&gt;
&lt;p&gt;However, most admins will find themselves glancing at it for its &lt;strong&gt;pps&lt;/strong&gt;, &lt;strong&gt;bps&lt;/strong&gt;, and &lt;strong&gt;utilisation statistics&lt;/strong&gt;. These update every &lt;strong&gt;second&lt;/strong&gt; and mean you can get a &lt;strong&gt;quick overview&lt;/strong&gt; no matter what screen you’re on. It combines with a clever &lt;strong&gt;grid-based display&lt;/strong&gt; for &lt;strong&gt;packet buffer&lt;/strong&gt;, which can be quickly exported for use in other software’s or replays.&lt;/p&gt;
&lt;p&gt;Another important section is the &lt;strong&gt;Tools&lt;/strong&gt; tab, which gives access to Capsa’s &lt;strong&gt;Base64 Codec&lt;/strong&gt;, &lt;strong&gt;Ping&lt;/strong&gt;, &lt;strong&gt;Packet Player&lt;/strong&gt;, &lt;strong&gt;Packet Builder&lt;/strong&gt;, and &lt;strong&gt;MAC Scanner&lt;/strong&gt; applications. These can also be accessed via the &lt;strong&gt;file menu&lt;/strong&gt; in the top left but having them for quick access is a nice touch.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-tools.png&quot; alt=&quot;capsa enterprise v11 tools&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 tools&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, a &lt;strong&gt;Views &lt;/strong&gt;tab gives very useful and quick access to a number of display modes. These enable panels like the &lt;strong&gt;alarm view&lt;/strong&gt; and let you switch between important options like &lt;strong&gt;IP&lt;/strong&gt;/&lt;strong&gt;MAC address&lt;/strong&gt; only or &lt;strong&gt;name only&lt;/strong&gt; modes.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-views-tab.png&quot; alt=&quot;capsa enterprise v11 views tab&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 views tab&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;In general, Colosoft has done a great job of packing a lot of information into one application while keeping it customizable. However, there are some areas where it really shines, and its &lt;strong&gt;Matrix&lt;/strong&gt; tab is one of those. With a single click, you can get a visual overview of much of the conversations on a network, with &lt;strong&gt;Top 100 MAC&lt;/strong&gt;, &lt;strong&gt;MAC Node&lt;/strong&gt;, &lt;strong&gt;IP Conversation&lt;/strong&gt;, and &lt;strong&gt;IP Node&lt;/strong&gt; views:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-top-100-mac-matrix.png&quot; alt=&quot;capsa enterprise v11 top 100 mac matrix&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 top 100 mac matrix&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Firewall.cx has praised this feature before and it remains a strong highlight of the software. Admins are able to move the lines of the diagrams around at will for clarity, click on each address to view the related packets, and quickly make filters via a right click interface.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-matrix.png&quot; alt=&quot;capsa enterprise v11 matrix&quot; title=&quot;capsa enterprise v11 matrix&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The information above is from a single PC, so you can imagine how useful it gets once more devices are introduced. You can select individual IP addresses in the node explorer on the left-hand side to get a quick overview of their &lt;strong&gt;IP&lt;/strong&gt; and &lt;strong&gt;MAC conversations&lt;/strong&gt;, with the ability to customize the &lt;strong&gt;Matrix&lt;/strong&gt; for a higher &lt;strong&gt;maximum node number&lt;/strong&gt;, &lt;strong&gt;traffic types&lt;/strong&gt;, and &lt;strong&gt;value&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-modify-matrix.png&quot; alt=&quot;capsa enterprise v11 modify matrix&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 modify matrix&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Thanks to its&lt;strong&gt; v7.8&lt;/strong&gt; update, Capsa also has support for detailed &lt;strong&gt;VoIP Analysis&lt;/strong&gt;. Users can configure &lt;strong&gt;RTP&lt;/strong&gt; via the &lt;strong&gt;System&amp;gt;Decoder&lt;/strong&gt; menu, with support for multiple sources and destination addresses, encoding types, and ports.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-rtp-system-decoder.png&quot; alt=&quot;capsa enterprise v11 rtp system decoder&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 rtp system decoder&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once everything is configured correctly, admins will begin to see the &lt;strong&gt;VoIP Call&lt;/strong&gt; tab populate useful information. A summary tab shows &lt;strong&gt;MOS_A/V distribution&lt;/strong&gt; with ratings between &lt;strong&gt;Good&lt;/strong&gt; (4.24-5.00) and &lt;strong&gt;Bad&lt;/strong&gt; (0.00-3.59). A status column shows &lt;strong&gt;success&lt;/strong&gt;, &lt;strong&gt;failure&lt;/strong&gt;, and &lt;strong&gt;rejection&lt;/strong&gt;, and a &lt;strong&gt;diagnosis tab&lt;/strong&gt; keeps count of &lt;strong&gt;setup times&lt;/strong&gt;, &lt;strong&gt;bandwidth rejects&lt;/strong&gt;, and more. While our test environment didn't contain VoIP traffic we still included the screesnhot below to help give readers the full picture.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-voip-traffic-analysis.png&quot; alt=&quot;capsa enterprise v11 voip traffic analysis&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 voip traffic analysis&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In addition, a window below keeps track of &lt;strong&gt;packets&lt;/strong&gt;, &lt;strong&gt;bytes&lt;/strong&gt;, &lt;strong&gt;utilization&lt;/strong&gt;, and &lt;strong&gt;average throughput&lt;/strong&gt;, as well as various statistics. Finally, the &lt;strong&gt;Call&lt;/strong&gt; tab lists &lt;strong&gt;numbers&lt;/strong&gt; and &lt;strong&gt;endpoints&lt;/strong&gt;, alongside their &lt;strong&gt;jitter&lt;/strong&gt;, &lt;strong&gt;packet loss&lt;/strong&gt;, &lt;strong&gt;codec&lt;/strong&gt;, and more. Like most aspects of Capsa, this data can be exported or turned into a custom report from within the software.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Capsa Enterprise 11&lt;/strong&gt; creates a number of these reports by default. A global report gives an overview of total traffic with &lt;strong&gt;MAC address counts&lt;/strong&gt;, &lt;strong&gt;protocol counts&lt;/strong&gt;, &lt;strong&gt;top MAC/IP addresses&lt;/strong&gt;, and more. There are also separate auto-generated reports for &lt;strong&gt;VoIP&lt;/strong&gt;, &lt;strong&gt;Conversation&lt;/strong&gt;, &lt;strong&gt;Top Traffic&lt;/strong&gt;, &lt;strong&gt;Port&lt;/strong&gt;, and &lt;strong&gt;Packet&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-protocol-analyzers/capsa-enterprise-v11-reporting-capabilities.png&quot; alt=&quot;capsa enterprise v11 reporting capabilities&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;capsa enterprise v11 reporting capabilities&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You can customize these with &lt;strong&gt;logo&lt;/strong&gt; and &lt;strong&gt;author name&lt;/strong&gt;, but they’re missing many of the features you’d see in advanced reporting software. There’s no option for a pie chart, for example, though they can be created via the node explorer and saved as an image.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Conclusion&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Capsa Enterprise 11&lt;/strong&gt; is a testament to Colasoft’s consistent improvements over the years. It has very few compromises, refusing to skimp on features while still maintaining ease of use. Capsa comes in two different flavors – &lt;strong&gt;Enterprise version&lt;/strong&gt; or the &lt;strong&gt;Standard version&lt;/strong&gt;, making it an &lt;strong&gt;extremely affordable&lt;/strong&gt; &amp;amp; &lt;strong&gt;robust toolset&lt;/strong&gt; with the ability to &lt;strong&gt;reduce&lt;/strong&gt; the &lt;strong&gt;downtime&lt;/strong&gt; and make &lt;strong&gt;troubleshooting&lt;/strong&gt; an &lt;strong&gt;enjoyable process&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Though its visual design and report features look somewhat dated, the layout is incredibly effective. Admins will spend much of their time in the &lt;strong&gt;matrix view&lt;/strong&gt; but can also make use of very specific filters to deliver only the data they want. It got the &lt;strong&gt;Firewall.cx seal of approval&lt;/strong&gt; last time it was reviewed, and we feel comfortable giving it again.&lt;/p&gt;</content>
		<category term="Network Protocol Analyzers" />
	</entry>
	<entry>
		<title>Detect Brute-Force Attacks with nChronos Network Security Forensic Analysis Tool</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/nchronos-brute-force-attack-detection.html"/>
		<published>2016-03-05T19:51:53+11:00</published>
		<updated>2016-03-05T19:51:53+11:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/nchronos-brute-force-attack-detection.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/colasoft-nchronos-brute-force-attack-detection-1a.jpg&quot; alt=&quot;colasoft-nchronos-brute-force-attack-detection-1&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;nChronos Brute Force Attack Detection&quot; /&gt;&lt;strong&gt;Brute-force attacks&lt;/strong&gt; are commonly known &lt;strong&gt;attack methods&lt;/strong&gt; by which hackers try to get &lt;strong&gt;access to restricted accounts&lt;/strong&gt; and data using an &lt;strong&gt;exhaustive list/database&lt;/strong&gt; of &lt;strong&gt;usernames&lt;/strong&gt; and &lt;strong&gt;passwords&lt;/strong&gt;. &lt;strong&gt;Brute-force attacks&lt;/strong&gt; can be used, in theory, &lt;strong&gt;against almost any encrypted data&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When it comes to user accounts (web based or system based), the first sign of a brute-force attack is when we see multiple attempts to login to an account, therefore allowing us to detect a brute-force attack by analyzing packets that contain such events. We’ll show you how Colasoft’s nChronos can be used to identify brute-force attacks, and obtain valuable information that can help discover the identity of the attacker plus more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For an attacker to obtain access to a user account on a website via brute force, he is required to use the site’s login page, causing an alarming amount of login attempts from his IP address. nChronos is capable of capturing such events and triggering a transaction alarm, warning system administrators of brute-force attacks and when the triggering condition was met.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Visit our &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; target=&quot;_blank&quot; title=&quot;Network Protocol Analyzer Section&quot;&gt;Network Protocol Analyzer Section&lt;/a&gt; for high-quality technical articles covering Wireshark topics, detecting and creating different type of network attacks plus many more great security articles.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Creating A Transaction Analysis &amp;amp; Alarm In nChronos&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;First, we need to create a transaction analysis to specify the pattern/behavior we are interested in monitoring:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;From the nChronos main page, first select the server/IP address we want to monitor from the &lt;strong&gt;Server Explorer&lt;/strong&gt; section.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, from the &lt;strong&gt;Link Properties&lt;/strong&gt;, go to the &lt;strong&gt;Application&lt;/strong&gt; section and then the &lt;strong&gt;Analysis Settings&lt;/strong&gt; as shown below:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/colasoft-nchronos-brute-force-attack-detection-1b.png&quot; target=&quot;_blank&quot; type=&quot;image/png&quot; class=&quot;jcepopup&quot; title=&quot;Creating a Transaction Analysis in nChronos&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;Creating a Transaction Analysis in nChronos&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/colasoft-nchronos-brute-force-attack-detection-1a.png&quot; alt=&quot;colasoft-nchronos-brute-force-attack-detection-2a&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;nChronos configuration for Brute Force Attack Detection&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. Creating a Transaction Analysis in nChronos (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now &lt;strong&gt;click&lt;/strong&gt; the button of &lt;strong&gt;New Web Application&lt;/strong&gt; (second green button at the top) to set a &lt;strong&gt;Web Application&lt;/strong&gt;, input &lt;strong&gt;Name&lt;/strong&gt; and &lt;strong&gt;HTTP Hostname&lt;/strong&gt;, then &lt;strong&gt;check the box&lt;/strong&gt; labeled &lt;strong&gt;Enable Transaction Analysis&lt;/strong&gt; and add a transaction with &lt;strong&gt;URL subpath&lt;/strong&gt; e.g “/login.html”.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At this point we’ve created the necessary &lt;strong&gt;Transaction Analysis&lt;/strong&gt;. All that’s required now is to create the &lt;strong&gt;Transaction Alarm&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To create the alarm, click &lt;strong&gt;Transaction Alarms&lt;/strong&gt; in the left window, input the basic information and choose the parameter of &lt;strong&gt;Transaction Statistics&lt;/strong&gt; in &lt;strong&gt;Type&lt;/strong&gt;, and then set a &lt;strong&gt;Triggering Condition&lt;/strong&gt; as needed, for example, &lt;strong&gt;100 times&lt;/strong&gt; in &lt;strong&gt;1 minute&lt;/strong&gt;. This means that the specific alarm will activate as soon as there are 100 or more logins within a minute:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/colasoft-nchronos-brute-force-attack-detection-2b.png&quot; target=&quot;_blank&quot; type=&quot;image/png&quot; class=&quot;jcepopup&quot; title=&quot;nChronos - Creating a Transaction Alarm&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;nChronos - Creating a Transaction Alarm&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/colasoft-nchronos-brute-force-attack-detection-2a.png&quot; alt=&quot;colasoft-nchronos-brute-force-attack-detection-3a&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;nChronos configuration for Brute Force Attack Detection&quot; /&gt;&lt;/a&gt;Figure 2. Creating a Transaction Alarm (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, you can choose &lt;strong&gt;Send to email box&lt;/strong&gt; or &lt;strong&gt;Send to SYSLOG&lt;/strong&gt; to send the alarm notification. Once complete, the transaction alarm for &lt;strong&gt;detecting brute-force attack&lt;/strong&gt; is set. When the alarm triggering condition is met an email notification is sent.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Note that the specific alarm triggering condition does not examine the amount of logins per IP address, which means the alarm condition will be met regardless if the 100 login attempts/min is from one or more individual IP addresses. This can be manually changed from the &lt;strong&gt;Transaction Analysis&lt;/strong&gt; so that it shows the login attempt times of each individual IP address.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Below is a sample output from an alarm triggered:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/colasoft-nchronos-brute-force-attack-detection-3b.png&quot; target=&quot;_blank&quot; type=&quot;image/png&quot; class=&quot;jcepopup&quot; title=&quot;nChronos Brute-Force alarm triggered – Overall report&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;nChronos Brute-Force Alarm Triggered – Overall Report&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/colasoft-nchronos-brute-force-attack-detection-3a.png&quot; alt=&quot;colasoft-nchronos-brute-force-attack-detection-3a&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;nChronos configuration for Brute Force Attack Detection&quot; /&gt;&lt;/a&gt;Figure 3. nChronos Brute-Force alarm triggered – Overall report (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;And below we see the same alarm with a per-IP address analysis:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/colasoft-nchronos-brute-force-attack-detection-4b.png&quot; target=&quot;_blank&quot; type=&quot;image/png&quot; class=&quot;jcepopup&quot; title=&quot;nChronos Brute-Force alarm triggered – IP breakdown&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;nChronos Brute-Force alarm triggered – IP breakdown&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/colasoft-nchronos-brute-force-attack-detection-4a.png&quot; alt=&quot;colasoft-nchronos-brute-force-attack-detection-4a&quot; style=&quot;border: 1px solid #000000;&quot; title=&quot;nChronos configuration for Brute Force Attack Detection&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 4. nChronos Brute-Force alarm triggered – IP breakdown (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The article shows how &lt;strong&gt;nChronos&lt;/strong&gt; can be used to &lt;strong&gt;successfully detect a Brute-Force attack&lt;/strong&gt; against any node on a &lt;strong&gt;network&lt;/strong&gt; or even &lt;strong&gt;websites&lt;/strong&gt;, and at the same time &lt;strong&gt;alert system administrators&lt;/strong&gt; or &lt;strong&gt;IT managers&lt;/strong&gt; of the event.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/colasoft-nchronos-brute-force-attack-detection-1a.jpg&quot; alt=&quot;colasoft-nchronos-brute-force-attack-detection-1&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;nChronos Brute Force Attack Detection&quot; /&gt;&lt;strong&gt;Brute-force attacks&lt;/strong&gt; are commonly known &lt;strong&gt;attack methods&lt;/strong&gt; by which hackers try to get &lt;strong&gt;access to restricted accounts&lt;/strong&gt; and data using an &lt;strong&gt;exhaustive list/database&lt;/strong&gt; of &lt;strong&gt;usernames&lt;/strong&gt; and &lt;strong&gt;passwords&lt;/strong&gt;. &lt;strong&gt;Brute-force attacks&lt;/strong&gt; can be used, in theory, &lt;strong&gt;against almost any encrypted data&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When it comes to user accounts (web based or system based), the first sign of a brute-force attack is when we see multiple attempts to login to an account, therefore allowing us to detect a brute-force attack by analyzing packets that contain such events. We’ll show you how Colasoft’s nChronos can be used to identify brute-force attacks, and obtain valuable information that can help discover the identity of the attacker plus more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For an attacker to obtain access to a user account on a website via brute force, he is required to use the site’s login page, causing an alarming amount of login attempts from his IP address. nChronos is capable of capturing such events and triggering a transaction alarm, warning system administrators of brute-force attacks and when the triggering condition was met.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Visit our &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; target=&quot;_blank&quot; title=&quot;Network Protocol Analyzer Section&quot;&gt;Network Protocol Analyzer Section&lt;/a&gt; for high-quality technical articles covering Wireshark topics, detecting and creating different type of network attacks plus many more great security articles.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Creating A Transaction Analysis &amp;amp; Alarm In nChronos&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;First, we need to create a transaction analysis to specify the pattern/behavior we are interested in monitoring:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;From the nChronos main page, first select the server/IP address we want to monitor from the &lt;strong&gt;Server Explorer&lt;/strong&gt; section.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, from the &lt;strong&gt;Link Properties&lt;/strong&gt;, go to the &lt;strong&gt;Application&lt;/strong&gt; section and then the &lt;strong&gt;Analysis Settings&lt;/strong&gt; as shown below:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/colasoft-nchronos-brute-force-attack-detection-1b.png&quot; target=&quot;_blank&quot; type=&quot;image/png&quot; class=&quot;jcepopup&quot; title=&quot;Creating a Transaction Analysis in nChronos&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;Creating a Transaction Analysis in nChronos&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/colasoft-nchronos-brute-force-attack-detection-1a.png&quot; alt=&quot;colasoft-nchronos-brute-force-attack-detection-2a&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;nChronos configuration for Brute Force Attack Detection&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. Creating a Transaction Analysis in nChronos (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now &lt;strong&gt;click&lt;/strong&gt; the button of &lt;strong&gt;New Web Application&lt;/strong&gt; (second green button at the top) to set a &lt;strong&gt;Web Application&lt;/strong&gt;, input &lt;strong&gt;Name&lt;/strong&gt; and &lt;strong&gt;HTTP Hostname&lt;/strong&gt;, then &lt;strong&gt;check the box&lt;/strong&gt; labeled &lt;strong&gt;Enable Transaction Analysis&lt;/strong&gt; and add a transaction with &lt;strong&gt;URL subpath&lt;/strong&gt; e.g “/login.html”.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At this point we’ve created the necessary &lt;strong&gt;Transaction Analysis&lt;/strong&gt;. All that’s required now is to create the &lt;strong&gt;Transaction Alarm&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To create the alarm, click &lt;strong&gt;Transaction Alarms&lt;/strong&gt; in the left window, input the basic information and choose the parameter of &lt;strong&gt;Transaction Statistics&lt;/strong&gt; in &lt;strong&gt;Type&lt;/strong&gt;, and then set a &lt;strong&gt;Triggering Condition&lt;/strong&gt; as needed, for example, &lt;strong&gt;100 times&lt;/strong&gt; in &lt;strong&gt;1 minute&lt;/strong&gt;. This means that the specific alarm will activate as soon as there are 100 or more logins within a minute:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/colasoft-nchronos-brute-force-attack-detection-2b.png&quot; target=&quot;_blank&quot; type=&quot;image/png&quot; class=&quot;jcepopup&quot; title=&quot;nChronos - Creating a Transaction Alarm&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;nChronos - Creating a Transaction Alarm&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/colasoft-nchronos-brute-force-attack-detection-2a.png&quot; alt=&quot;colasoft-nchronos-brute-force-attack-detection-3a&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;nChronos configuration for Brute Force Attack Detection&quot; /&gt;&lt;/a&gt;Figure 2. Creating a Transaction Alarm (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, you can choose &lt;strong&gt;Send to email box&lt;/strong&gt; or &lt;strong&gt;Send to SYSLOG&lt;/strong&gt; to send the alarm notification. Once complete, the transaction alarm for &lt;strong&gt;detecting brute-force attack&lt;/strong&gt; is set. When the alarm triggering condition is met an email notification is sent.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Note that the specific alarm triggering condition does not examine the amount of logins per IP address, which means the alarm condition will be met regardless if the 100 login attempts/min is from one or more individual IP addresses. This can be manually changed from the &lt;strong&gt;Transaction Analysis&lt;/strong&gt; so that it shows the login attempt times of each individual IP address.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Below is a sample output from an alarm triggered:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/colasoft-nchronos-brute-force-attack-detection-3b.png&quot; target=&quot;_blank&quot; type=&quot;image/png&quot; class=&quot;jcepopup&quot; title=&quot;nChronos Brute-Force alarm triggered – Overall report&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;nChronos Brute-Force Alarm Triggered – Overall Report&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/colasoft-nchronos-brute-force-attack-detection-3a.png&quot; alt=&quot;colasoft-nchronos-brute-force-attack-detection-3a&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;nChronos configuration for Brute Force Attack Detection&quot; /&gt;&lt;/a&gt;Figure 3. nChronos Brute-Force alarm triggered – Overall report (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;And below we see the same alarm with a per-IP address analysis:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/colasoft-nchronos-brute-force-attack-detection-4b.png&quot; target=&quot;_blank&quot; type=&quot;image/png&quot; class=&quot;jcepopup&quot; title=&quot;nChronos Brute-Force alarm triggered – IP breakdown&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;nChronos Brute-Force alarm triggered – IP breakdown&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/colasoft-nchronos-brute-force-attack-detection-4a.png&quot; alt=&quot;colasoft-nchronos-brute-force-attack-detection-4a&quot; style=&quot;border: 1px solid #000000;&quot; title=&quot;nChronos configuration for Brute Force Attack Detection&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 4. nChronos Brute-Force alarm triggered – IP breakdown (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The article shows how &lt;strong&gt;nChronos&lt;/strong&gt; can be used to &lt;strong&gt;successfully detect a Brute-Force attack&lt;/strong&gt; against any node on a &lt;strong&gt;network&lt;/strong&gt; or even &lt;strong&gt;websites&lt;/strong&gt;, and at the same time &lt;strong&gt;alert system administrators&lt;/strong&gt; or &lt;strong&gt;IT managers&lt;/strong&gt; of the event.&lt;/p&gt;</content>
		<category term="Network Protocol Analyzers" />
	</entry>
	<entry>
		<title>Introducing Colasoft Unified Performance Management</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/introduction-to-unified-performance-management.html"/>
		<published>2016-01-31T10:52:44+11:00</published>
		<updated>2016-01-31T10:52:44+11:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/introduction-to-unified-performance-management.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-1a.jpg&quot; alt=&quot;Introduction to Colasoft Unified Performance Management&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Introduction to Colasoft Unified Performance Management&quot; /&gt;Colasoft &lt;strong&gt;Unified Performance Management&lt;/strong&gt; (UPM) is a business-oriented network performance management system, which analyzes network performance, quality, fault, and security issues based on business. By providing visual analysis of business performances, Colasoft UPM helps users promote business-oriented proactive network operational capability, ensure the stable running of businesses, and enhance troubleshooting efficiency.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Colasoft UPM contains two parts: &lt;strong&gt;Chronos Server&lt;/strong&gt; as a frontend device and &lt;strong&gt;UPM Center&lt;/strong&gt; as the analysis center.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Frontend devices are deployed at the key nodes of the communication link of business systems, which capture business communication data by switch port-mirroring or network TAP. The frontend collects and analyzes the performance index parameters and application alarm information in real-time, and uploads to the UPM Center via the management interface for overall analysis.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Visit our &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; target=&quot;_blank&quot; title=&quot;Network Protocol Analyzer Section&quot;&gt;Network Protocol Analyzer Section&lt;/a&gt; for high-quality technical articles covering Wireshark topics, detecting and creating different type of network attacks plus many more great security articles.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;UPM Center is deployed at the headquarters to collect the business performance indexes and alarm information uploaded by frontend devices, and display the analysis results.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The start page of Colasoft UPM is shown below:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;left&quot;&gt;&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-1-large.jpg&quot; rel=&quot;nofollow&quot; type=&quot;image/jpeg&quot; class=&quot;jcepopup&quot; title=&quot;UPM Homepage&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;UPM Homepage &quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-1.jpg&quot; alt=&quot;introduction-to-unified-performance-management-1&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Unified Performance Management Home Page&quot; /&gt;&lt;/a&gt;Figure 1. Unified Performance Management Homepage (click image to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The statistics information of business and alarm in a period of time is shown in this page.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Hovering the mouse over a business sensor (lower left area), we can see there are several options such as “&lt;strong&gt;Analyze&lt;/strong&gt;”, “&lt;strong&gt;Query&lt;/strong&gt;”, “&lt;strong&gt;Edit&lt;/strong&gt;” and “&lt;strong&gt;Delete&lt;/strong&gt;”:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;left&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-2-large.jpg&quot; type=&quot;image/jpeg&quot; class=&quot;jcepopup&quot; title=&quot;UPM - Adding Sensor&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;UPM - Adding Sensor&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-2.jpg&quot; alt=&quot;introduction-to-unified-performance-management-2&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Unified Performance Management - Adding a Business logic sensor to be analyzed&quot; /&gt;&lt;/a&gt;Figure 2. Adding or analyzing a Business logic sensor to be analyzed (click image to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;We can &lt;strong&gt;click&lt;/strong&gt; “&lt;strong&gt;Analyze&lt;/strong&gt;” to check the business logic diagram and detailed alarm information.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;left&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-3-large.jpg&quot; type=&quot;image/jpeg&quot; class=&quot;jcepopup&quot; title=&quot;UPM - Analyzing a business sensor - service performance&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;Analyzing a Business Logic&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-3.jpg&quot; alt=&quot;introduction-to-unified-performance-management-3&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Unified Performance Management - Analyzing a Business logic sensor to be analyzed&quot; /&gt;&lt;/a&gt;Figure 3. Analyzing a business logic and checking for service alarms (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&lt;strong&gt;Click&lt;/strong&gt; “&lt;strong&gt;Query&lt;/strong&gt;” to check the index parameters to analyze network performance:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;left&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-4-large.jpg&quot; type=&quot;image/jpeg&quot; class=&quot;jcepopup&quot; title=&quot;UPM - Analyze application performance&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;UPM - Analyze Application Performance&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-4.jpg&quot; alt=&quot;introduction-to-unified-performance-management-4&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Unified Performance Management - Analyzing performance of a business application or service&quot; /&gt;&lt;/a&gt;Figure 4. Analyzing performance of a specific application or service (click to enlarge)&lt;br /&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-4-large.jpg&quot; target=&quot;_blank&quot; rel=&quot;nofollow&quot; title=&quot;UPM - Analyze application performance&quot;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;We can also &lt;strong&gt;click&lt;/strong&gt; “&lt;strong&gt;Intelligent Application&lt;/strong&gt;” in the homepage, to review the relationship of the nodes in the business system:&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-5-large.jpg&quot; type=&quot;image/jpeg&quot; class=&quot;jcepopup&quot; title=&quot;UPM - Node relationship in the business system&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;The Intelligent Application Section&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-5.jpg&quot; alt=&quot;introduction-to-unified-performance-management-5&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Unified Performance Management - Node relationship in the business system&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;left&quot;&gt;Figure 5. The Intelligent Application section reveals the relationship of nodes in the business system&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In short, &lt;strong&gt;Colasoft UPM&lt;/strong&gt; helps users easily manage network performance by providing visual analysis based on business, which greatly enhances troubleshooting efficiency and reduces human resource cost.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-1a.jpg&quot; alt=&quot;Introduction to Colasoft Unified Performance Management&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Introduction to Colasoft Unified Performance Management&quot; /&gt;Colasoft &lt;strong&gt;Unified Performance Management&lt;/strong&gt; (UPM) is a business-oriented network performance management system, which analyzes network performance, quality, fault, and security issues based on business. By providing visual analysis of business performances, Colasoft UPM helps users promote business-oriented proactive network operational capability, ensure the stable running of businesses, and enhance troubleshooting efficiency.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Colasoft UPM contains two parts: &lt;strong&gt;Chronos Server&lt;/strong&gt; as a frontend device and &lt;strong&gt;UPM Center&lt;/strong&gt; as the analysis center.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Frontend devices are deployed at the key nodes of the communication link of business systems, which capture business communication data by switch port-mirroring or network TAP. The frontend collects and analyzes the performance index parameters and application alarm information in real-time, and uploads to the UPM Center via the management interface for overall analysis.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Visit our &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; target=&quot;_blank&quot; title=&quot;Network Protocol Analyzer Section&quot;&gt;Network Protocol Analyzer Section&lt;/a&gt; for high-quality technical articles covering Wireshark topics, detecting and creating different type of network attacks plus many more great security articles.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;UPM Center is deployed at the headquarters to collect the business performance indexes and alarm information uploaded by frontend devices, and display the analysis results.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The start page of Colasoft UPM is shown below:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;left&quot;&gt;&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-1-large.jpg&quot; rel=&quot;nofollow&quot; type=&quot;image/jpeg&quot; class=&quot;jcepopup&quot; title=&quot;UPM Homepage&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;UPM Homepage &quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-1.jpg&quot; alt=&quot;introduction-to-unified-performance-management-1&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Unified Performance Management Home Page&quot; /&gt;&lt;/a&gt;Figure 1. Unified Performance Management Homepage (click image to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The statistics information of business and alarm in a period of time is shown in this page.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Hovering the mouse over a business sensor (lower left area), we can see there are several options such as “&lt;strong&gt;Analyze&lt;/strong&gt;”, “&lt;strong&gt;Query&lt;/strong&gt;”, “&lt;strong&gt;Edit&lt;/strong&gt;” and “&lt;strong&gt;Delete&lt;/strong&gt;”:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;left&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-2-large.jpg&quot; type=&quot;image/jpeg&quot; class=&quot;jcepopup&quot; title=&quot;UPM - Adding Sensor&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;UPM - Adding Sensor&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-2.jpg&quot; alt=&quot;introduction-to-unified-performance-management-2&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Unified Performance Management - Adding a Business logic sensor to be analyzed&quot; /&gt;&lt;/a&gt;Figure 2. Adding or analyzing a Business logic sensor to be analyzed (click image to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;We can &lt;strong&gt;click&lt;/strong&gt; “&lt;strong&gt;Analyze&lt;/strong&gt;” to check the business logic diagram and detailed alarm information.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;left&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-3-large.jpg&quot; type=&quot;image/jpeg&quot; class=&quot;jcepopup&quot; title=&quot;UPM - Analyzing a business sensor - service performance&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;Analyzing a Business Logic&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-3.jpg&quot; alt=&quot;introduction-to-unified-performance-management-3&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Unified Performance Management - Analyzing a Business logic sensor to be analyzed&quot; /&gt;&lt;/a&gt;Figure 3. Analyzing a business logic and checking for service alarms (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&lt;strong&gt;Click&lt;/strong&gt; “&lt;strong&gt;Query&lt;/strong&gt;” to check the index parameters to analyze network performance:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;left&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-4-large.jpg&quot; type=&quot;image/jpeg&quot; class=&quot;jcepopup&quot; title=&quot;UPM - Analyze application performance&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;UPM - Analyze Application Performance&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-4.jpg&quot; alt=&quot;introduction-to-unified-performance-management-4&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Unified Performance Management - Analyzing performance of a business application or service&quot; /&gt;&lt;/a&gt;Figure 4. Analyzing performance of a specific application or service (click to enlarge)&lt;br /&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-4-large.jpg&quot; target=&quot;_blank&quot; rel=&quot;nofollow&quot; title=&quot;UPM - Analyze application performance&quot;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;We can also &lt;strong&gt;click&lt;/strong&gt; “&lt;strong&gt;Intelligent Application&lt;/strong&gt;” in the homepage, to review the relationship of the nodes in the business system:&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-5-large.jpg&quot; type=&quot;image/jpeg&quot; class=&quot;jcepopup&quot; title=&quot;UPM - Node relationship in the business system&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;The Intelligent Application Section&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/introduction-to-unified-performance-management-5.jpg&quot; alt=&quot;introduction-to-unified-performance-management-5&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Unified Performance Management - Node relationship in the business system&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;left&quot;&gt;Figure 5. The Intelligent Application section reveals the relationship of nodes in the business system&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In short, &lt;strong&gt;Colasoft UPM&lt;/strong&gt; helps users easily manage network performance by providing visual analysis based on business, which greatly enhances troubleshooting efficiency and reduces human resource cost.&lt;/p&gt;</content>
		<category term="Network Protocol Analyzers" />
	</entry>
	<entry>
		<title>How to Detect P2P (peer-to-peer) File Sharing, Torrent Traffic &amp; Users with a Network Analyzer</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/capsa-network-analyzer-detect-p2p-file-sharing-torrent-traffic.html"/>
		<published>2015-12-09T15:58:35+11:00</published>
		<updated>2015-12-09T15:58:35+11:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/capsa-network-analyzer-detect-p2p-file-sharing-torrent-traffic.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/capsa-network-analyzer-detect-p2p-file-sharing-torrent-traffic-1a.png&quot; alt=&quot;capsa-network-analyzer-detect-p2p-file-sharing-torrent-traffic-1a&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Identify and capture P2P - Torrent File sharing traffic &quot; /&gt;Peer-to-Peer file sharing traffic&lt;/strong&gt; has become a very &lt;strong&gt;large problem&lt;/strong&gt; for many &lt;strong&gt;organizations&lt;/strong&gt; as users engage in &lt;strong&gt;illegal&lt;/strong&gt; (most times) &lt;strong&gt;file sharing processes&lt;/strong&gt; that not only consumes &lt;strong&gt;valuable bandwidth&lt;/strong&gt;, but also places the organization in danger as &lt;strong&gt;high-risk connections&lt;/strong&gt; are made from the Internet to the internal network and &lt;strong&gt;malware&lt;/strong&gt;, &lt;strong&gt;pirated or copyrighted material&lt;/strong&gt; or &lt;strong&gt;pornography&lt;/strong&gt; is downloaded into the &lt;strong&gt;organization’s systems&lt;/strong&gt;. The fact is that &lt;strong&gt;torrent traffic&lt;/strong&gt; is &lt;strong&gt;responsible&lt;/strong&gt; for over 29% of US Internet's traffic in North America, indicating how big the problem is.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To help network professionals in the P2P battle, we’ll show how &lt;strong&gt;Network Analyzers&lt;/strong&gt; such as Colasoft Capsa, can be used to &lt;strong&gt;identify users&lt;/strong&gt; or &lt;strong&gt;IP addresses&lt;/strong&gt; involved the&lt;strong&gt; file sharing process&lt;/strong&gt;, allowing IT departments to take the necessary actions to block users and similair activities.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While all network analyzers capture and display packets, very few have the ability to display P2P traffic or users creating multiple connections with remote peers - allowing network administrators to quickly and correctly identify P2P activity.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Visit our &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; target=&quot;_blank&quot; title=&quot;Network Protocol Analyzer Section&quot;&gt;Network Protocol Analyzer Section&lt;/a&gt; for high-quality technical articles covering Wireshark topics, detecting and creating different type of network attacks plus many more great security articles.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the main traffic characteristics of P2P host traffic is that they create many connections to and from hosts on the Internet, in order to download from multiple sources or upload to multiple destinations.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Apart from using the correct tools, network administrators and engineers must also ensure they capture traffic at strategic areas within their network. This means that the network analyzer must be placed at the point where all network traffic, to and from the Internet, passes through it.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The two most common places network traffic is captured is at the router/firewall connecting the organization to the Internet or the main switch where the router/firewall device connects to. To learn how to configure these devices and enable the network analyzer to capture packets, visit the following articles:&lt;/p&gt;
&lt;ul class=&quot;checkbox&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-span-monitoring.html&quot; target=&quot;_blank&quot; title=&quot;Configuring SPAN On Cisco Catalyst Switches - Monitor &amp;amp; Capture Network Traffic/Packets&quot;&gt;Configuring SPAN On Cisco Catalyst Switches - Monitor &amp;amp; Capture Network Traffic/Packets&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-routers/cisco-router-embedded-packet-capture-configuration-usage-troubleshooting-exporting.html&quot; target=&quot;_blank&quot; title=&quot;How to Capture Packets on your Cisco Router with Embedded Packet Capture - Configuration, Troubleshooting &amp;amp; Data Export&quot;&gt;How to Capture Packets on your Cisco Router with Embedded Packet Capture - Configuration, Troubleshooting &amp;amp; Data Export&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While capturing commences, data will start being displayed in Capsa, and thanks to the &lt;strong&gt;Matrix display&lt;/strong&gt; feature, we can quickly identify hosts that have multiple conversations or connections with peer hosts on the Internet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By selecting the &lt;strong&gt;Matrix&lt;/strong&gt; tab and hovering the mouse on a host of interest (this also automatically selects the host), Capsa will highlight all conversations with other IP addresses made by the selected host, while at the same time provide additional useful information such as &lt;strong&gt;bytes sent and received&lt;/strong&gt; by the host, &lt;strong&gt;amount of peer connections&lt;/strong&gt; (extremely useful!) and more:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/capsa-network-analyzer-detect-p2p-file-sharing-torrent-traffic-1.jpg&quot; alt=&quot;&quot; width=&quot;850&quot; height=&quot;419&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Using the Capsa Matrix feature to highlight conversations of a specific host suspected for P2P traffic&quot; data-alt=&quot;capsa-network-analyzer-detect-p2p-file-sharing-torrent-traffic-1&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 1. Using the Capsa Matrix feature to highlight conversations of a specific host suspected of P2P traffic&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In most cases, an excessive amount of peer connections means that there is a P2P application running, generating all the displayed traffic and connections.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, to drill into to the host's traffic, simply &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Protocol&lt;/strong&gt; tab to automatically show the amount of traffic generated by each protocol. Here we will happily find the &lt;strong&gt;BitTorrent&lt;/strong&gt; &amp;amp; &lt;strong&gt;eMule&lt;/strong&gt; protocol listed:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/capsa-network-analyzer-detect-p2p-file-sharing-torrent-traffic-2.jpg&quot; alt=&quot;capsa-network-analyzer-detect-p2p-file-sharing-torrent-traffic-2&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Identifying P2P Traffic and associated hosts in Capsa Network Analyzer&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. Identifying P2P Traffic and associated hosts in Capsa Network Analyzer&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;IP Endpoint&lt;/strong&gt; tab below provides additional useful information such as IP address, bytes of traffic associated with the host, number of packets, total amount of bytes and more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By &lt;strong&gt;double-clicking&lt;/strong&gt; on the host of interest (under IP EndPoint), Capsa will open a separate window and display all data captured for the subject host, allowing extensive in-depth analysis of packets:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/capsa-network-analyzer-detect-p2p-file-sharing-torrent-traffic-3.jpg&quot; alt=&quot;capsa-network-analyzer-detect-p2p-file-sharing-torrent-traffic-3&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Diving into a host’s captured packets with the help of Capsa Network Analyzer&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 3. Diving into a host’s captured packets with the help of Capsa Network Analyzer&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Multiple UDP conversations through the same port, indicate that there may be a P2P download or upload in progress.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Further inspection of packet information such as info hash, port, remote peer(s), etc. in ASCII decoding mode will confirm the capture traffic is indeed from P2P traffic.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article &lt;strong&gt;demonstrated&lt;/strong&gt; how &lt;strong&gt;Capsa network analyser&lt;/strong&gt; can be used to &lt;strong&gt;detect Peer-to-Peer&lt;/strong&gt; (&lt;strong&gt;P2P&lt;/strong&gt;) &lt;strong&gt;traffic&lt;/strong&gt; in a &lt;strong&gt;network environment&lt;/strong&gt;. We examined the &lt;strong&gt;Matrix feature&lt;/strong&gt; of Capsa, plus its &lt;strong&gt;ability to automatically identify P2P/Torrent traffic&lt;/strong&gt;, making it easier for &lt;strong&gt;network administrators&lt;/strong&gt; to&lt;strong&gt; track down&lt;/strong&gt; &lt;strong&gt;P2P clients&lt;/strong&gt; within their organization.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/capsa-network-analyzer-detect-p2p-file-sharing-torrent-traffic-1a.png&quot; alt=&quot;capsa-network-analyzer-detect-p2p-file-sharing-torrent-traffic-1a&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Identify and capture P2P - Torrent File sharing traffic &quot; /&gt;Peer-to-Peer file sharing traffic&lt;/strong&gt; has become a very &lt;strong&gt;large problem&lt;/strong&gt; for many &lt;strong&gt;organizations&lt;/strong&gt; as users engage in &lt;strong&gt;illegal&lt;/strong&gt; (most times) &lt;strong&gt;file sharing processes&lt;/strong&gt; that not only consumes &lt;strong&gt;valuable bandwidth&lt;/strong&gt;, but also places the organization in danger as &lt;strong&gt;high-risk connections&lt;/strong&gt; are made from the Internet to the internal network and &lt;strong&gt;malware&lt;/strong&gt;, &lt;strong&gt;pirated or copyrighted material&lt;/strong&gt; or &lt;strong&gt;pornography&lt;/strong&gt; is downloaded into the &lt;strong&gt;organization’s systems&lt;/strong&gt;. The fact is that &lt;strong&gt;torrent traffic&lt;/strong&gt; is &lt;strong&gt;responsible&lt;/strong&gt; for over 29% of US Internet's traffic in North America, indicating how big the problem is.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To help network professionals in the P2P battle, we’ll show how &lt;strong&gt;Network Analyzers&lt;/strong&gt; such as Colasoft Capsa, can be used to &lt;strong&gt;identify users&lt;/strong&gt; or &lt;strong&gt;IP addresses&lt;/strong&gt; involved the&lt;strong&gt; file sharing process&lt;/strong&gt;, allowing IT departments to take the necessary actions to block users and similair activities.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While all network analyzers capture and display packets, very few have the ability to display P2P traffic or users creating multiple connections with remote peers - allowing network administrators to quickly and correctly identify P2P activity.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Visit our &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; target=&quot;_blank&quot; title=&quot;Network Protocol Analyzer Section&quot;&gt;Network Protocol Analyzer Section&lt;/a&gt; for high-quality technical articles covering Wireshark topics, detecting and creating different type of network attacks plus many more great security articles.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the main traffic characteristics of P2P host traffic is that they create many connections to and from hosts on the Internet, in order to download from multiple sources or upload to multiple destinations.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Apart from using the correct tools, network administrators and engineers must also ensure they capture traffic at strategic areas within their network. This means that the network analyzer must be placed at the point where all network traffic, to and from the Internet, passes through it.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The two most common places network traffic is captured is at the router/firewall connecting the organization to the Internet or the main switch where the router/firewall device connects to. To learn how to configure these devices and enable the network analyzer to capture packets, visit the following articles:&lt;/p&gt;
&lt;ul class=&quot;checkbox&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-span-monitoring.html&quot; target=&quot;_blank&quot; title=&quot;Configuring SPAN On Cisco Catalyst Switches - Monitor &amp;amp; Capture Network Traffic/Packets&quot;&gt;Configuring SPAN On Cisco Catalyst Switches - Monitor &amp;amp; Capture Network Traffic/Packets&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-routers/cisco-router-embedded-packet-capture-configuration-usage-troubleshooting-exporting.html&quot; target=&quot;_blank&quot; title=&quot;How to Capture Packets on your Cisco Router with Embedded Packet Capture - Configuration, Troubleshooting &amp;amp; Data Export&quot;&gt;How to Capture Packets on your Cisco Router with Embedded Packet Capture - Configuration, Troubleshooting &amp;amp; Data Export&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While capturing commences, data will start being displayed in Capsa, and thanks to the &lt;strong&gt;Matrix display&lt;/strong&gt; feature, we can quickly identify hosts that have multiple conversations or connections with peer hosts on the Internet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By selecting the &lt;strong&gt;Matrix&lt;/strong&gt; tab and hovering the mouse on a host of interest (this also automatically selects the host), Capsa will highlight all conversations with other IP addresses made by the selected host, while at the same time provide additional useful information such as &lt;strong&gt;bytes sent and received&lt;/strong&gt; by the host, &lt;strong&gt;amount of peer connections&lt;/strong&gt; (extremely useful!) and more:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/capsa-network-analyzer-detect-p2p-file-sharing-torrent-traffic-1.jpg&quot; alt=&quot;&quot; width=&quot;850&quot; height=&quot;419&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Using the Capsa Matrix feature to highlight conversations of a specific host suspected for P2P traffic&quot; data-alt=&quot;capsa-network-analyzer-detect-p2p-file-sharing-torrent-traffic-1&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 1. Using the Capsa Matrix feature to highlight conversations of a specific host suspected of P2P traffic&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In most cases, an excessive amount of peer connections means that there is a P2P application running, generating all the displayed traffic and connections.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, to drill into to the host's traffic, simply &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Protocol&lt;/strong&gt; tab to automatically show the amount of traffic generated by each protocol. Here we will happily find the &lt;strong&gt;BitTorrent&lt;/strong&gt; &amp;amp; &lt;strong&gt;eMule&lt;/strong&gt; protocol listed:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/capsa-network-analyzer-detect-p2p-file-sharing-torrent-traffic-2.jpg&quot; alt=&quot;capsa-network-analyzer-detect-p2p-file-sharing-torrent-traffic-2&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Identifying P2P Traffic and associated hosts in Capsa Network Analyzer&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. Identifying P2P Traffic and associated hosts in Capsa Network Analyzer&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;IP Endpoint&lt;/strong&gt; tab below provides additional useful information such as IP address, bytes of traffic associated with the host, number of packets, total amount of bytes and more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By &lt;strong&gt;double-clicking&lt;/strong&gt; on the host of interest (under IP EndPoint), Capsa will open a separate window and display all data captured for the subject host, allowing extensive in-depth analysis of packets:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/capsa-network-analyzer-detect-p2p-file-sharing-torrent-traffic-3.jpg&quot; alt=&quot;capsa-network-analyzer-detect-p2p-file-sharing-torrent-traffic-3&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Diving into a host’s captured packets with the help of Capsa Network Analyzer&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 3. Diving into a host’s captured packets with the help of Capsa Network Analyzer&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Multiple UDP conversations through the same port, indicate that there may be a P2P download or upload in progress.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Further inspection of packet information such as info hash, port, remote peer(s), etc. in ASCII decoding mode will confirm the capture traffic is indeed from P2P traffic.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article &lt;strong&gt;demonstrated&lt;/strong&gt; how &lt;strong&gt;Capsa network analyser&lt;/strong&gt; can be used to &lt;strong&gt;detect Peer-to-Peer&lt;/strong&gt; (&lt;strong&gt;P2P&lt;/strong&gt;) &lt;strong&gt;traffic&lt;/strong&gt; in a &lt;strong&gt;network environment&lt;/strong&gt;. We examined the &lt;strong&gt;Matrix feature&lt;/strong&gt; of Capsa, plus its &lt;strong&gt;ability to automatically identify P2P/Torrent traffic&lt;/strong&gt;, making it easier for &lt;strong&gt;network administrators&lt;/strong&gt; to&lt;strong&gt; track down&lt;/strong&gt; &lt;strong&gt;P2P clients&lt;/strong&gt; within their organization.&lt;/p&gt;</content>
		<category term="Network Protocol Analyzers" />
	</entry>
	<entry>
		<title>Improve Network Analysis Efficiency with Colasoft's Capsa New Conversation Colorization Feature</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/colasoft-capsa-colorization-feature-improve-network-analysis.html"/>
		<published>2015-09-22T05:20:00+10:00</published>
		<updated>2015-09-22T05:20:00+10:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/colasoft-capsa-colorization-feature-improve-network-analysis.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/how-to-improve-network-analysis-with_capsa-colorization-feature-0.jpg&quot; alt=&quot;how-to-improve-network-analysis-with capsa-colorization-feature-0&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Network Troubleshooting with Network Analyzer&quot; /&gt;Troubleshooting network problems&lt;/strong&gt; can be a very difficult and challenging task. While most IT engineers use a &lt;strong&gt;network analyzer&lt;/strong&gt; to &lt;strong&gt;help solve network problems&lt;/strong&gt;, when &lt;strong&gt;analyzing hundreds or thousands of packets&lt;/strong&gt;, it can become very hard to locate and further research conversations between hosts. Colasoft’s Capsa v8 now introduces a &lt;strong&gt;new feature&lt;/strong&gt; that allows us to &lt;strong&gt;highlight-colorize relevant IP conversations&lt;/strong&gt; in the network based on their &lt;strong&gt;MAC address&lt;/strong&gt;, &lt;strong&gt;IP Addresses&lt;/strong&gt;, &lt;strong&gt;TCP&lt;/strong&gt; or &lt;strong&gt;UDP conversations&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This great new feature will allow IT engineers to quickly find the related packets of the conversations they want to analyze emphatically, using just a few clicks.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Visit our &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; target=&quot;_blank&quot; title=&quot;Network Protocol Analyzer Section&quot;&gt;Network Protocol Analyzer Section&lt;/a&gt; for high-quality technical articles covering Wireshark topics, detecting and creating different type of network attacks plus many more great security articles.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As shown in the screenshot below, users can colorize any Conversation in the &lt;strong&gt;MAC Conversation View, IP Conversation View, TCP Conversation View&lt;/strong&gt; and &lt;strong&gt;UDP Conversation View&lt;/strong&gt;. Packets related to that Conversation will be colorized automatically with the same color.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Take&lt;strong&gt; TCP conversation&lt;/strong&gt; for example, choose one conversation, &lt;strong&gt;right-click&lt;/strong&gt; it and choose &lt;strong&gt;&quot;Select Conversation Color&quot;&lt;/strong&gt; in the pop-up menu:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/how-to-improve-network-analysis-with_capsa-colorization-feature-01.jpg&quot; alt=&quot;how-to-improve-network-analysis-with capsa-colorization-feature-01&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;Selecting a Conversation Color in Capsa v8.0&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 1. Selecting a Conversation Color in Capsa v8.0&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, select the color you wish to use to highlight the specific conversation:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/how-to-improve-network-analysis-with_capsa-colorization-feature-02.jpg&quot; alt=&quot;how-to-improve-network-analysis-with capsa-colorization-feature-02&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;Selecting a color&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 2. Selecting a color&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once the color has been selected, Capsa will automatically find and highlight all related packets of this conversation using the same background color:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/how-to-improve-network-analysis-with_capsa-colorization-feature-03.jpg&quot; alt=&quot;how-to-improve-network-analysis-with capsa-colorization-feature-03&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;Colasoft Capsa automatically identifies and highlights the conversation&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 3. Colasoft Capsa automatically identifies and highlights the conversation&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The relevance between a conversation and its packets is enhanced by &lt;strong&gt;colorizing packets&lt;/strong&gt; which &lt;strong&gt;greatly improves analysis efficiency&lt;/strong&gt;.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/how-to-improve-network-analysis-with_capsa-colorization-feature-0.jpg&quot; alt=&quot;how-to-improve-network-analysis-with capsa-colorization-feature-0&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Network Troubleshooting with Network Analyzer&quot; /&gt;Troubleshooting network problems&lt;/strong&gt; can be a very difficult and challenging task. While most IT engineers use a &lt;strong&gt;network analyzer&lt;/strong&gt; to &lt;strong&gt;help solve network problems&lt;/strong&gt;, when &lt;strong&gt;analyzing hundreds or thousands of packets&lt;/strong&gt;, it can become very hard to locate and further research conversations between hosts. Colasoft’s Capsa v8 now introduces a &lt;strong&gt;new feature&lt;/strong&gt; that allows us to &lt;strong&gt;highlight-colorize relevant IP conversations&lt;/strong&gt; in the network based on their &lt;strong&gt;MAC address&lt;/strong&gt;, &lt;strong&gt;IP Addresses&lt;/strong&gt;, &lt;strong&gt;TCP&lt;/strong&gt; or &lt;strong&gt;UDP conversations&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This great new feature will allow IT engineers to quickly find the related packets of the conversations they want to analyze emphatically, using just a few clicks.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Visit our &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; target=&quot;_blank&quot; title=&quot;Network Protocol Analyzer Section&quot;&gt;Network Protocol Analyzer Section&lt;/a&gt; for high-quality technical articles covering Wireshark topics, detecting and creating different type of network attacks plus many more great security articles.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As shown in the screenshot below, users can colorize any Conversation in the &lt;strong&gt;MAC Conversation View, IP Conversation View, TCP Conversation View&lt;/strong&gt; and &lt;strong&gt;UDP Conversation View&lt;/strong&gt;. Packets related to that Conversation will be colorized automatically with the same color.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Take&lt;strong&gt; TCP conversation&lt;/strong&gt; for example, choose one conversation, &lt;strong&gt;right-click&lt;/strong&gt; it and choose &lt;strong&gt;&quot;Select Conversation Color&quot;&lt;/strong&gt; in the pop-up menu:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/how-to-improve-network-analysis-with_capsa-colorization-feature-01.jpg&quot; alt=&quot;how-to-improve-network-analysis-with capsa-colorization-feature-01&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;Selecting a Conversation Color in Capsa v8.0&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 1. Selecting a Conversation Color in Capsa v8.0&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, select the color you wish to use to highlight the specific conversation:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/how-to-improve-network-analysis-with_capsa-colorization-feature-02.jpg&quot; alt=&quot;how-to-improve-network-analysis-with capsa-colorization-feature-02&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;Selecting a color&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 2. Selecting a color&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once the color has been selected, Capsa will automatically find and highlight all related packets of this conversation using the same background color:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/how-to-improve-network-analysis-with_capsa-colorization-feature-03.jpg&quot; alt=&quot;how-to-improve-network-analysis-with capsa-colorization-feature-03&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;Colasoft Capsa automatically identifies and highlights the conversation&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 3. Colasoft Capsa automatically identifies and highlights the conversation&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The relevance between a conversation and its packets is enhanced by &lt;strong&gt;colorizing packets&lt;/strong&gt; which &lt;strong&gt;greatly improves analysis efficiency&lt;/strong&gt;.&lt;/p&gt;</content>
		<category term="Network Protocol Analyzers" />
	</entry>
	<entry>
		<title>How To Detect ARP Attacks &amp; ARP Flooding With Colasoft Capsa Network Analyzer</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/capsa-network-analyzer-discover-arp-attacks-flooding.html"/>
		<published>2015-11-10T21:09:09+11:00</published>
		<updated>2015-11-10T21:09:09+11:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/capsa-network-analyzer-discover-arp-attacks-flooding.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;ARP attacks&lt;/strong&gt; and &lt;strong&gt;ARP flooding&lt;/strong&gt; are common problems &lt;strong&gt;small and large networks&lt;/strong&gt; are faced with. &lt;strong&gt;ARP attacks&lt;/strong&gt; &lt;strong&gt;target specific hosts&lt;/strong&gt; by &lt;strong&gt;using their MAC address&lt;/strong&gt; and &lt;strong&gt;responding on their behalf&lt;/strong&gt;, while at the same time &lt;strong&gt;flooding the network&lt;/strong&gt; with &lt;strong&gt;ARP requests&lt;/strong&gt;. ARP attacks are frequently used for '&lt;strong&gt;Man-in-the-middle&lt;/strong&gt;' &lt;strong&gt;attacks&lt;/strong&gt;, causing &lt;strong&gt;serious security threats&lt;/strong&gt;, &lt;strong&gt;loss of confidential information&lt;/strong&gt; and should be therefore &lt;strong&gt;quickly identified and mitigated&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;During ARP attacks, users usually experience slow communication on the network and especially when communicating with the host that is being targeted by the attack.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article, we will show you how to &lt;strong&gt;detect ARP attacks&lt;/strong&gt; and &lt;strong&gt;ARP flooding&lt;/strong&gt; using a network analyzer such as &lt;strong&gt;Colasoft Capsa&lt;/strong&gt;.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Visit our &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; target=&quot;_blank&quot; title=&quot;Network Protocol Analyzer Section&quot;&gt;Network Protocol Analyzer Section&lt;/a&gt; for high-quality technical articles covering Wireshark topics, detecting and creating different type of network attacks plus many more great security articles.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Colasoft Capsa has one great advantage – &lt;strong&gt;the ability to identify and present suspicious ARP attacks without any additional processing&lt;/strong&gt;, which makes identifying, mitigating and troubleshooting much easier.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Diagnosis&lt;/strong&gt; tab provides &lt;strong&gt;real-time information&lt;/strong&gt; and is extremely handy in identifying potential threats, as shown in the screenshot below:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/capsa-network-analyzer-discover-arp-attacks-flooding-1.jpg&quot; alt=&quot;capsa-network-analyzer-discover-arp-attacks-flooding-1&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Capsa Network Analyzer - Capturing ARP Attacks&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 1. ARP Scan and ARP Storm detected by Capsa's Diagnosis section.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Under the &lt;strong&gt;Diagnosis&lt;/strong&gt; tab, users can click on the Events area and select any suspicious events. When these events are selected, analysis of them (MAC address information in our case) will be displayed on the right as shown above.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In addition to the above analysis, Capsa also provides a dedicated &lt;strong&gt;ARP Attack&lt;/strong&gt; tab, which is used to verify the offending hosts and type of attack as shown below:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/capsa-network-analyzer-discover-arp-attacks-flooding-2.jpg&quot; alt=&quot;capsa-network-analyzer-discover-arp-attacks-flooding-2&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Capsa Network Analyzer - ARP Attack tab verifies the security threat&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 2. ARP Attack tab verifies the security threat.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We can extend our investigation with the use of the &lt;strong&gt;Protocol&lt;/strong&gt; tab, which allows us to drill into the ARP protocol and see which hosts MAC addresses are involved in heavy &lt;strong&gt;ARP protocol traffic&lt;/strong&gt;:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/capsa-network-analyzer-discover-arp-attacks-flooding-3.jpg&quot; alt=&quot;capsa-network-analyzer-discover-arp-attacks-flooding-3&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Capsa Network Analyzer - Drilling into ARP attacks.&quot; /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 3. Drilling into ARP attacks.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, double-clicking on a MAC address in the ARP Protocol section will show all packets related to the selected MAC address.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When double-clicking on a MAC address, Capsa presents all packets captured, allowing us to drill-down to more useful information contained in the ARP packet.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/capsa-network-analyzer-discover-arp-attacks-flooding-4.jpg&quot; alt=&quot;capsa-network-analyzer-discover-arp-attacks-flooding-4&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Capsa Network Analyzer - Drilling-down into the ARP attack packets.&quot; /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 4. Drilling-down into the ARP attack packets.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By selecting the &lt;strong&gt;Source IP&lt;/strong&gt;, in the lower window of the selected packet, we can see the fake IP address &lt;strong&gt;0.136.136.16&lt;/strong&gt;. This means that any host on the network responding to this packet will be directed to an incorrect and non-existent IP address, indicating an ARP attack of flood.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you're a network administrator, engineer or IT manager, we strongly suggest you try out &lt;strong&gt;Colasoft Capsa today&lt;/strong&gt; and see how easy you can &lt;strong&gt;troubleshoot and resolve network problems&lt;/strong&gt; and &lt;strong&gt;security threats &lt;/strong&gt;such as&lt;strong&gt; ARP Attacks &lt;/strong&gt;and&lt;strong&gt; ARP Flooding&lt;/strong&gt;.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;ARP attacks&lt;/strong&gt; and &lt;strong&gt;ARP flooding&lt;/strong&gt; are common problems &lt;strong&gt;small and large networks&lt;/strong&gt; are faced with. &lt;strong&gt;ARP attacks&lt;/strong&gt; &lt;strong&gt;target specific hosts&lt;/strong&gt; by &lt;strong&gt;using their MAC address&lt;/strong&gt; and &lt;strong&gt;responding on their behalf&lt;/strong&gt;, while at the same time &lt;strong&gt;flooding the network&lt;/strong&gt; with &lt;strong&gt;ARP requests&lt;/strong&gt;. ARP attacks are frequently used for '&lt;strong&gt;Man-in-the-middle&lt;/strong&gt;' &lt;strong&gt;attacks&lt;/strong&gt;, causing &lt;strong&gt;serious security threats&lt;/strong&gt;, &lt;strong&gt;loss of confidential information&lt;/strong&gt; and should be therefore &lt;strong&gt;quickly identified and mitigated&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;During ARP attacks, users usually experience slow communication on the network and especially when communicating with the host that is being targeted by the attack.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article, we will show you how to &lt;strong&gt;detect ARP attacks&lt;/strong&gt; and &lt;strong&gt;ARP flooding&lt;/strong&gt; using a network analyzer such as &lt;strong&gt;Colasoft Capsa&lt;/strong&gt;.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Visit our &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; target=&quot;_blank&quot; title=&quot;Network Protocol Analyzer Section&quot;&gt;Network Protocol Analyzer Section&lt;/a&gt; for high-quality technical articles covering Wireshark topics, detecting and creating different type of network attacks plus many more great security articles.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Colasoft Capsa has one great advantage – &lt;strong&gt;the ability to identify and present suspicious ARP attacks without any additional processing&lt;/strong&gt;, which makes identifying, mitigating and troubleshooting much easier.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Diagnosis&lt;/strong&gt; tab provides &lt;strong&gt;real-time information&lt;/strong&gt; and is extremely handy in identifying potential threats, as shown in the screenshot below:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/capsa-network-analyzer-discover-arp-attacks-flooding-1.jpg&quot; alt=&quot;capsa-network-analyzer-discover-arp-attacks-flooding-1&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Capsa Network Analyzer - Capturing ARP Attacks&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 1. ARP Scan and ARP Storm detected by Capsa's Diagnosis section.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Under the &lt;strong&gt;Diagnosis&lt;/strong&gt; tab, users can click on the Events area and select any suspicious events. When these events are selected, analysis of them (MAC address information in our case) will be displayed on the right as shown above.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In addition to the above analysis, Capsa also provides a dedicated &lt;strong&gt;ARP Attack&lt;/strong&gt; tab, which is used to verify the offending hosts and type of attack as shown below:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/capsa-network-analyzer-discover-arp-attacks-flooding-2.jpg&quot; alt=&quot;capsa-network-analyzer-discover-arp-attacks-flooding-2&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Capsa Network Analyzer - ARP Attack tab verifies the security threat&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 2. ARP Attack tab verifies the security threat.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We can extend our investigation with the use of the &lt;strong&gt;Protocol&lt;/strong&gt; tab, which allows us to drill into the ARP protocol and see which hosts MAC addresses are involved in heavy &lt;strong&gt;ARP protocol traffic&lt;/strong&gt;:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/capsa-network-analyzer-discover-arp-attacks-flooding-3.jpg&quot; alt=&quot;capsa-network-analyzer-discover-arp-attacks-flooding-3&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Capsa Network Analyzer - Drilling into ARP attacks.&quot; /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 3. Drilling into ARP attacks.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, double-clicking on a MAC address in the ARP Protocol section will show all packets related to the selected MAC address.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When double-clicking on a MAC address, Capsa presents all packets captured, allowing us to drill-down to more useful information contained in the ARP packet.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/capsa-network-analyzer-discover-arp-attacks-flooding-4.jpg&quot; alt=&quot;capsa-network-analyzer-discover-arp-attacks-flooding-4&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Capsa Network Analyzer - Drilling-down into the ARP attack packets.&quot; /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 4. Drilling-down into the ARP attack packets.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By selecting the &lt;strong&gt;Source IP&lt;/strong&gt;, in the lower window of the selected packet, we can see the fake IP address &lt;strong&gt;0.136.136.16&lt;/strong&gt;. This means that any host on the network responding to this packet will be directed to an incorrect and non-existent IP address, indicating an ARP attack of flood.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you're a network administrator, engineer or IT manager, we strongly suggest you try out &lt;strong&gt;Colasoft Capsa today&lt;/strong&gt; and see how easy you can &lt;strong&gt;troubleshoot and resolve network problems&lt;/strong&gt; and &lt;strong&gt;security threats &lt;/strong&gt;such as&lt;strong&gt; ARP Attacks &lt;/strong&gt;and&lt;strong&gt; ARP Flooding&lt;/strong&gt;.&lt;/p&gt;</content>
		<category term="Network Protocol Analyzers" />
	</entry>
	<entry>
		<title>How to Reconstruct HTTP Packets/Data &amp; Monitor HTTP User Activity with NChronos</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/nchronos-how-to-reconstruct-monitor-http-data-packets-captured.html"/>
		<published>2015-10-20T23:05:50+11:00</published>
		<updated>2015-10-20T23:05:50+11:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/nchronos-how-to-reconstruct-monitor-http-data-packets-captured.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;HTTP reconstruction&lt;/strong&gt; is an advanced &lt;strong&gt;network security feature&lt;/strong&gt; offered by &lt;strong&gt;nChronos&lt;/strong&gt; version 4.3.0 and later. &lt;strong&gt;nChronos&lt;/strong&gt; is a &lt;strong&gt;Network Forensic Analysis application&lt;/strong&gt; that captures packets/data around the clock. With HTTP reconstruction, network security engineers and IT managers can &lt;strong&gt;uncover suspicious user web activity&lt;/strong&gt; and &lt;strong&gt;check user web history&lt;/strong&gt; to examine specific &lt;strong&gt;HTTP incidents&lt;/strong&gt; or &lt;strong&gt;HTTP data transferred in/out of the corporate network&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Now let's take a look at how to use this new feature with Colasoft nChronos.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Visit our &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; target=&quot;_blank&quot; title=&quot;Network Protocol Analyzer Section&quot;&gt;Network Protocol Analyzer Section&lt;/a&gt; for high-quality technical articles covering Wireshark topics, detecting and creating different type of network attacks plus many more great security articles.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The HTTP reconstruction feature can be easily selected from the &lt;strong&gt;Link Analysis&lt;/strong&gt; area. We first need to carefully select the time range required to be examined e.g &lt;strong&gt;9th of July&lt;/strong&gt; between &lt;strong&gt;13:41&lt;/strong&gt; and &lt;strong&gt;13:49:15&lt;/strong&gt;. Once the time range is selected, we can move to the bottom window and select the &lt;strong&gt;IP Address&lt;/strong&gt; tab to choose the IP address of interest:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/nchronos-how-to-reconstruct-monitor-http-data-packets-captured-1.jpg&quot; alt=&quot;nchronos-how-to-reconstruct-monitor-http-data-packets-captured-1&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;How to reconstruct HTTP Packets with nChronos - Network Monitoring&quot; /&gt;Figure 1. Selecting our &lt;strong&gt;Time-Range&lt;/strong&gt;, and &lt;strong&gt;IP Address&lt;/strong&gt; of interest from &lt;strong&gt;Link Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;nChronos&lt;/strong&gt; further allows us to &lt;strong&gt;filter internal&lt;/strong&gt; and &lt;strong&gt;external&lt;/strong&gt; IP addresses, to help quickly identify the IP address of interest. We selected &lt;strong&gt;External IP&lt;/strong&gt; and then address &lt;strong&gt;173.205.14.226&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;All that's required at this point is to &lt;strong&gt;right-click&lt;/strong&gt; on the selected IP address and choose &lt;strong&gt;HTTP Packet Reconstruction&lt;/strong&gt; from the pop-up menu. Once &lt;strong&gt;HTTP Packet Reconstruction&lt;/strong&gt; is selected, a new tab will open and the reconstruction process will begin as shown below:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/nchronos-how-to-reconstruct-monitor-http-data-packets-captured-2.jpg&quot; alt=&quot;nchronos-how-to-reconstruct-monitor-http-data-packets-captured-2&quot; width=&quot;800&quot; height=&quot;190&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;HTTP Reconstruction in Progress - nChronos&quot; /&gt;Figure 2. nChronos HTTP Reconstruction feature in progress.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A progress bar at the top of the window shows the progress of the HTTP Reconstruction. Users are able to cancel the process anytime they wish and once the HTTP Reconstruction is complete, the progress bar disappears.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The screenshot below shows the end result once the HTTP Reconstruction has successfully completed:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/nchronos-how-to-reconstruct-monitor-http-data-packets-captured-3.jpg&quot; alt=&quot;nchronos-how-to-reconstruct-monitor-http-data-packets-captured-3&quot; width=&quot;800&quot; height=&quot;481&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;HTTP Reconstruction Complete - nChronos&quot; /&gt;Figure 3. The HTTP Reconstruction process completed&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As shown in the above screenshot, nChronos fully displays the reconstructed page in an easy-to-understand manner. Furthermore, all HTTP requests and commands are included to ensure complete visibility of the HTTP protocol commands sent to the remote web server, along with the user's browser and all other HTTP parameters.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;nChronos's &lt;strong&gt;HTTP reconstruction feature&lt;/strong&gt; can prove to be an extremely &lt;strong&gt;important security tool&lt;/strong&gt; for network engineers, administrators and IT Managers who need to keep an eye on incoming/outgoing web traffic. This new feature surpasses &lt;strong&gt;web proxy reporting&lt;/strong&gt; and other similar tools as it is able to completely &lt;strong&gt;reconstruct the webpage visited, data exchanged between the server and client&lt;/strong&gt;, plus help &lt;strong&gt;identify/verify security issues&lt;/strong&gt; with &lt;strong&gt;hijacked websites&lt;/strong&gt;.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;HTTP reconstruction&lt;/strong&gt; is an advanced &lt;strong&gt;network security feature&lt;/strong&gt; offered by &lt;strong&gt;nChronos&lt;/strong&gt; version 4.3.0 and later. &lt;strong&gt;nChronos&lt;/strong&gt; is a &lt;strong&gt;Network Forensic Analysis application&lt;/strong&gt; that captures packets/data around the clock. With HTTP reconstruction, network security engineers and IT managers can &lt;strong&gt;uncover suspicious user web activity&lt;/strong&gt; and &lt;strong&gt;check user web history&lt;/strong&gt; to examine specific &lt;strong&gt;HTTP incidents&lt;/strong&gt; or &lt;strong&gt;HTTP data transferred in/out of the corporate network&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Now let's take a look at how to use this new feature with Colasoft nChronos.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Visit our &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; target=&quot;_blank&quot; title=&quot;Network Protocol Analyzer Section&quot;&gt;Network Protocol Analyzer Section&lt;/a&gt; for high-quality technical articles covering Wireshark topics, detecting and creating different type of network attacks plus many more great security articles.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The HTTP reconstruction feature can be easily selected from the &lt;strong&gt;Link Analysis&lt;/strong&gt; area. We first need to carefully select the time range required to be examined e.g &lt;strong&gt;9th of July&lt;/strong&gt; between &lt;strong&gt;13:41&lt;/strong&gt; and &lt;strong&gt;13:49:15&lt;/strong&gt;. Once the time range is selected, we can move to the bottom window and select the &lt;strong&gt;IP Address&lt;/strong&gt; tab to choose the IP address of interest:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/nchronos-how-to-reconstruct-monitor-http-data-packets-captured-1.jpg&quot; alt=&quot;nchronos-how-to-reconstruct-monitor-http-data-packets-captured-1&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;How to reconstruct HTTP Packets with nChronos - Network Monitoring&quot; /&gt;Figure 1. Selecting our &lt;strong&gt;Time-Range&lt;/strong&gt;, and &lt;strong&gt;IP Address&lt;/strong&gt; of interest from &lt;strong&gt;Link Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;nChronos&lt;/strong&gt; further allows us to &lt;strong&gt;filter internal&lt;/strong&gt; and &lt;strong&gt;external&lt;/strong&gt; IP addresses, to help quickly identify the IP address of interest. We selected &lt;strong&gt;External IP&lt;/strong&gt; and then address &lt;strong&gt;173.205.14.226&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;All that's required at this point is to &lt;strong&gt;right-click&lt;/strong&gt; on the selected IP address and choose &lt;strong&gt;HTTP Packet Reconstruction&lt;/strong&gt; from the pop-up menu. Once &lt;strong&gt;HTTP Packet Reconstruction&lt;/strong&gt; is selected, a new tab will open and the reconstruction process will begin as shown below:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/nchronos-how-to-reconstruct-monitor-http-data-packets-captured-2.jpg&quot; alt=&quot;nchronos-how-to-reconstruct-monitor-http-data-packets-captured-2&quot; width=&quot;800&quot; height=&quot;190&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;HTTP Reconstruction in Progress - nChronos&quot; /&gt;Figure 2. nChronos HTTP Reconstruction feature in progress.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A progress bar at the top of the window shows the progress of the HTTP Reconstruction. Users are able to cancel the process anytime they wish and once the HTTP Reconstruction is complete, the progress bar disappears.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The screenshot below shows the end result once the HTTP Reconstruction has successfully completed:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/nchronos-how-to-reconstruct-monitor-http-data-packets-captured-3.jpg&quot; alt=&quot;nchronos-how-to-reconstruct-monitor-http-data-packets-captured-3&quot; width=&quot;800&quot; height=&quot;481&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;HTTP Reconstruction Complete - nChronos&quot; /&gt;Figure 3. The HTTP Reconstruction process completed&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As shown in the above screenshot, nChronos fully displays the reconstructed page in an easy-to-understand manner. Furthermore, all HTTP requests and commands are included to ensure complete visibility of the HTTP protocol commands sent to the remote web server, along with the user's browser and all other HTTP parameters.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;nChronos's &lt;strong&gt;HTTP reconstruction feature&lt;/strong&gt; can prove to be an extremely &lt;strong&gt;important security tool&lt;/strong&gt; for network engineers, administrators and IT Managers who need to keep an eye on incoming/outgoing web traffic. This new feature surpasses &lt;strong&gt;web proxy reporting&lt;/strong&gt; and other similar tools as it is able to completely &lt;strong&gt;reconstruct the webpage visited, data exchanged between the server and client&lt;/strong&gt;, plus help &lt;strong&gt;identify/verify security issues&lt;/strong&gt; with &lt;strong&gt;hijacked websites&lt;/strong&gt;.&lt;/p&gt;</content>
		<category term="Network Protocol Analyzers" />
	</entry>
	<entry>
		<title>How to Use Multi-Segment Analysis to Troubleshoot Network Delay, Packet Loss and Retransmissions with Colasoft nChronos</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/network-troubleshooting-multi-segment-analysis-with-nchronos.html"/>
		<published>2015-08-10T20:58:04+10:00</published>
		<updated>2015-08-10T20:58:04+10:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/network-troubleshooting-multi-segment-analysis-with-nchronos.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-troubleshooting-multi-segment-analysis-with-nchronos-00.png&quot; alt=&quot;network-troubleshooting-multi-segment-analysis-with-nchronos-00&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Network troubleshooting&quot; /&gt;Troubleshooting network problems&lt;/strong&gt; can be a very intensive and challenging process. &lt;strong&gt;Intermittent network problems&lt;/strong&gt; are even more difficult to &lt;strong&gt;troubleshoot&lt;/strong&gt; as the problem occurs at &lt;strong&gt;random times&lt;/strong&gt; with a &lt;strong&gt;random duration&lt;/strong&gt;, making it very hard to &lt;strong&gt;capture the necessary information, perform troubleshooting, identify&lt;/strong&gt; and &lt;strong&gt;resolve the network problem&lt;/strong&gt;.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;While &lt;strong&gt;Network Analyzers&lt;/strong&gt; help reveal problems in a network data flow, they are limited to examining usually only &lt;strong&gt;one network link at a time&lt;/strong&gt;, thus seriously limiting the ability to examine &lt;strong&gt;multiple network segments&lt;/strong&gt; continuously.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;nChronos is equipped with a neat feature called multi-segment analysis, providing an easy way for IT network engineers and administrators to &lt;strong&gt;compare the performance between different links&lt;/strong&gt;. IT network engineers can &lt;strong&gt;improve network performance&lt;/strong&gt; by enhancing the capacity of the link according to the comparison.&lt;/p&gt;
&lt;p&gt;Let’s take a look how we can use Colasoft nChronos’s&lt;strong&gt; multi-segment analysis&lt;/strong&gt; feature to help us detect and deal effectively with our network problems.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Visit our &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; target=&quot;_blank&quot; title=&quot;Network Protocol Analyzer Section&quot;&gt;Network Protocol Analyzer Section&lt;/a&gt; for high-quality technical articles covering Wireshark topics, detecting and creating different type of network attacks plus many more great security articles.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Multi-segment analysis&lt;/strong&gt; provides concurrent analysis for conversations across different links, from which we can extract valuable information on packet loss, network delay, data retransmission and more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To being, we open &lt;strong&gt;nChronos Console&lt;/strong&gt; and &lt;strong&gt;select a portion&lt;/strong&gt; of the trend chart in the &lt;strong&gt;Link Analysis&lt;/strong&gt; window, then from the &lt;strong&gt;Summary window&lt;/strong&gt; below, we &lt;strong&gt;right-click&lt;/strong&gt; one conversation under the &lt;strong&gt;IP Conversation&lt;/strong&gt; or &lt;strong&gt;TCP Conversation&lt;/strong&gt; tab. From the pop-up menu, select &lt;strong&gt;Multi-Segment Analysis&lt;/strong&gt; to open the &lt;strong&gt;Multi-Segment Analysis&lt;/strong&gt; window:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-troubleshooting-multi-segment-analysis-with-nchronos-01.png&quot; alt=&quot;network-troubleshooting-multi-segment-analysis-with-nchronos-01&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;Launching Multi-Segment Analysis in nChronos&quot; /&gt;&lt;br /&gt;Figure 1. Launching Multi-Segment Analysis in nChronos&lt;/p&gt;
&lt;p&gt;In the &lt;strong&gt;Multi-Segment Analysis&lt;/strong&gt; window, select a &lt;strong&gt;minimum&lt;/strong&gt; of &lt;strong&gt;two&lt;/strong&gt; and &lt;strong&gt;maximum&lt;/strong&gt; of &lt;strong&gt;three&lt;/strong&gt; links, then choose the stream of interest for multi-segment analysis:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-troubleshooting-multi-segment-analysis-with-nchronos-02.png&quot; alt=&quot;network-troubleshooting-multi-segment-analysis-with-nchronos-02&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;Selecting a stream for multi-segment analysis in nChronos&quot; /&gt;&lt;br /&gt;Figure 2. Selecting a stream for multi-segment analysis in nChronos&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When choosing a conversation for multi-segment analysis, if any of the other selected network links has the same conversation, it will be selected and highlighted automatically. In our example, the second selected link does not have the same data from the primary selected conversation and therefore there is no data to display in the lower section of the analysis window.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, &lt;strong&gt;Click Start to Analyze&lt;/strong&gt; to open the &lt;strong&gt;Multi-Segment Detail Analysis&lt;/strong&gt; window, as shown in the figure below:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-troubleshooting-multi-segment-analysis-with-nchronos-03.png&quot; alt=&quot;network-troubleshooting-multi-segment-analysis-with-nchronos-03&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;Performing Multi-Segment analysis in nChronos&quot; /&gt;&lt;br /&gt;Figure 3. Performing Multi-Segment analysis in nChronos&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;Multi-Segment Detail Analysis&lt;/strong&gt; section on the left provides a plethora of parameter statistics (analyzed below), a time sequence chart, and there’s a &lt;strong&gt;packet decoding pane&lt;/strong&gt; on the lower right section of the window.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The left pane provides statistics on uplink and downlink packet loss, uplink and downlink network delay, uplink and downlink retransmission, uplink and downlink TCP flags, and much more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The time sequence chart located at the top, graphically displays the packet transmission between the network links, with the conversation time displayed on the horizontal axis.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When you click on a packet on the &lt;strong&gt;time sequence chart&lt;/strong&gt;, the &lt;strong&gt;packet decoding pane&lt;/strong&gt; will display the detailed decoding information for that packet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Using the &lt;strong&gt;Multi-Segment Analysis&lt;/strong&gt; feature, Colasoft’s &lt;strong&gt;nChronos&lt;/strong&gt; allows us to quickly &lt;strong&gt;compare the performance&lt;/strong&gt; between two or more &lt;strong&gt;network links&lt;/strong&gt;.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-troubleshooting-multi-segment-analysis-with-nchronos-00.png&quot; alt=&quot;network-troubleshooting-multi-segment-analysis-with-nchronos-00&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Network troubleshooting&quot; /&gt;Troubleshooting network problems&lt;/strong&gt; can be a very intensive and challenging process. &lt;strong&gt;Intermittent network problems&lt;/strong&gt; are even more difficult to &lt;strong&gt;troubleshoot&lt;/strong&gt; as the problem occurs at &lt;strong&gt;random times&lt;/strong&gt; with a &lt;strong&gt;random duration&lt;/strong&gt;, making it very hard to &lt;strong&gt;capture the necessary information, perform troubleshooting, identify&lt;/strong&gt; and &lt;strong&gt;resolve the network problem&lt;/strong&gt;.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;While &lt;strong&gt;Network Analyzers&lt;/strong&gt; help reveal problems in a network data flow, they are limited to examining usually only &lt;strong&gt;one network link at a time&lt;/strong&gt;, thus seriously limiting the ability to examine &lt;strong&gt;multiple network segments&lt;/strong&gt; continuously.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;nChronos is equipped with a neat feature called multi-segment analysis, providing an easy way for IT network engineers and administrators to &lt;strong&gt;compare the performance between different links&lt;/strong&gt;. IT network engineers can &lt;strong&gt;improve network performance&lt;/strong&gt; by enhancing the capacity of the link according to the comparison.&lt;/p&gt;
&lt;p&gt;Let’s take a look how we can use Colasoft nChronos’s&lt;strong&gt; multi-segment analysis&lt;/strong&gt; feature to help us detect and deal effectively with our network problems.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Visit our &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; target=&quot;_blank&quot; title=&quot;Network Protocol Analyzer Section&quot;&gt;Network Protocol Analyzer Section&lt;/a&gt; for high-quality technical articles covering Wireshark topics, detecting and creating different type of network attacks plus many more great security articles.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Multi-segment analysis&lt;/strong&gt; provides concurrent analysis for conversations across different links, from which we can extract valuable information on packet loss, network delay, data retransmission and more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To being, we open &lt;strong&gt;nChronos Console&lt;/strong&gt; and &lt;strong&gt;select a portion&lt;/strong&gt; of the trend chart in the &lt;strong&gt;Link Analysis&lt;/strong&gt; window, then from the &lt;strong&gt;Summary window&lt;/strong&gt; below, we &lt;strong&gt;right-click&lt;/strong&gt; one conversation under the &lt;strong&gt;IP Conversation&lt;/strong&gt; or &lt;strong&gt;TCP Conversation&lt;/strong&gt; tab. From the pop-up menu, select &lt;strong&gt;Multi-Segment Analysis&lt;/strong&gt; to open the &lt;strong&gt;Multi-Segment Analysis&lt;/strong&gt; window:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-troubleshooting-multi-segment-analysis-with-nchronos-01.png&quot; alt=&quot;network-troubleshooting-multi-segment-analysis-with-nchronos-01&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;Launching Multi-Segment Analysis in nChronos&quot; /&gt;&lt;br /&gt;Figure 1. Launching Multi-Segment Analysis in nChronos&lt;/p&gt;
&lt;p&gt;In the &lt;strong&gt;Multi-Segment Analysis&lt;/strong&gt; window, select a &lt;strong&gt;minimum&lt;/strong&gt; of &lt;strong&gt;two&lt;/strong&gt; and &lt;strong&gt;maximum&lt;/strong&gt; of &lt;strong&gt;three&lt;/strong&gt; links, then choose the stream of interest for multi-segment analysis:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-troubleshooting-multi-segment-analysis-with-nchronos-02.png&quot; alt=&quot;network-troubleshooting-multi-segment-analysis-with-nchronos-02&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;Selecting a stream for multi-segment analysis in nChronos&quot; /&gt;&lt;br /&gt;Figure 2. Selecting a stream for multi-segment analysis in nChronos&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When choosing a conversation for multi-segment analysis, if any of the other selected network links has the same conversation, it will be selected and highlighted automatically. In our example, the second selected link does not have the same data from the primary selected conversation and therefore there is no data to display in the lower section of the analysis window.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, &lt;strong&gt;Click Start to Analyze&lt;/strong&gt; to open the &lt;strong&gt;Multi-Segment Detail Analysis&lt;/strong&gt; window, as shown in the figure below:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-troubleshooting-multi-segment-analysis-with-nchronos-03.png&quot; alt=&quot;network-troubleshooting-multi-segment-analysis-with-nchronos-03&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;Performing Multi-Segment analysis in nChronos&quot; /&gt;&lt;br /&gt;Figure 3. Performing Multi-Segment analysis in nChronos&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;Multi-Segment Detail Analysis&lt;/strong&gt; section on the left provides a plethora of parameter statistics (analyzed below), a time sequence chart, and there’s a &lt;strong&gt;packet decoding pane&lt;/strong&gt; on the lower right section of the window.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The left pane provides statistics on uplink and downlink packet loss, uplink and downlink network delay, uplink and downlink retransmission, uplink and downlink TCP flags, and much more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The time sequence chart located at the top, graphically displays the packet transmission between the network links, with the conversation time displayed on the horizontal axis.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When you click on a packet on the &lt;strong&gt;time sequence chart&lt;/strong&gt;, the &lt;strong&gt;packet decoding pane&lt;/strong&gt; will display the detailed decoding information for that packet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Using the &lt;strong&gt;Multi-Segment Analysis&lt;/strong&gt; feature, Colasoft’s &lt;strong&gt;nChronos&lt;/strong&gt; allows us to quickly &lt;strong&gt;compare the performance&lt;/strong&gt; between two or more &lt;strong&gt;network links&lt;/strong&gt;.&lt;/p&gt;</content>
		<category term="Network Protocol Analyzers" />
	</entry>
	<entry>
		<title>How to Detect Routing Loops and Physical Loops with a Network Analyzer</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/how-to-detect-routing-and-physical-loops-using-a-network-analyzer.html"/>
		<published>2015-07-28T01:31:04+10:00</published>
		<updated>2015-07-28T01:31:04+10:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers/how-to-detect-routing-and-physical-loops-using-a-network-analyzer.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/how-to-detect-routing-and-physical-loops-using-a-network-analyzer-01a.png&quot; alt=&quot;how-to-detect-routing-and-physical-loops-using-a-network-analyzer-01a&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Detect routing and physical loops using a network analyzer&quot; /&gt;When working with &lt;strong&gt;medium&lt;/strong&gt; to &lt;strong&gt;large scale networks&lt;/strong&gt;, IT departments are often faced dealing with &lt;strong&gt;network loops&lt;/strong&gt; and &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/switches-bridges.html&quot; target=&quot;_blank&quot; title=&quot;broadcast storms&quot;&gt;broadcast storms&lt;/a&gt; that are caused by &lt;strong&gt;user error&lt;/strong&gt;, &lt;strong&gt;faulty network devices&lt;/strong&gt; or &lt;strong&gt;incorrect configuration&lt;/strong&gt; of network equipment.&amp;nbsp; &lt;strong&gt;Network loops&lt;/strong&gt; and &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/switches-bridges.html&quot; target=&quot;_blank&quot; title=&quot;broadcast storms&quot;&gt;broadcast storms&lt;/a&gt; are capable of causing &lt;strong&gt;major network disruptions&lt;/strong&gt; and therefore must be dealt with very quickly.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are&lt;strong&gt; two kinds of network loops&lt;/strong&gt; and these are &lt;strong&gt;routing loops&lt;/strong&gt; and&lt;strong&gt; physical loops&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Routing loops&lt;/strong&gt; are caused by the incorrect configuration of &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols.html&quot; target=&quot;_blank&quot; title=&quot;routing protocols&quot;&gt;routing protocols&lt;/a&gt; where data packets sent between hosts of different networks, are caught in an endless loop travelling between network routers with incorrect route entries.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A &lt;strong&gt;Physical loop&lt;/strong&gt; is caused by a loop link between devices. A common example is two switches with two active Ethernet links between them. &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-broadcast.html&quot; target=&quot;_blank&quot; title=&quot;Broadcast packets&quot;&gt;Broadcast packets &lt;/a&gt;exiting the links on one switch are replicated and sent back from the other switch. This is also known as a &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/switches-bridges.html&quot; target=&quot;_blank&quot; title=&quot;broadcast storm&quot;&gt;broadcast storm&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Both type of loops are capable of causing major network outages, waste of valuable bandwidth and can disrupt network communications.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We will show you how to detect routing loop and physical loop with a network analyzer such as Colasoft Capsa or Wireshark.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Note: To capture packets on a port that's connected to a Cisco Catalyst switch, users can also read our &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-span-monitoring.html&quot; target=&quot;_blank&quot; title=&quot;Configuring SPAN On Cisco Catalyst Switches - Monitor &amp;amp; Capture Network Traffic/Packets&quot;&gt;Configuring SPAN On Cisco Catalyst Switches - Monitor &amp;amp; Capture Network Traffic/Packets&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If there are &lt;strong&gt;routing loops&lt;/strong&gt; or &lt;strong&gt;physical loops&lt;/strong&gt; in the network, Capsa will immediately report them in the &lt;strong&gt;Diagnosis&lt;/strong&gt; tab as shown below. This makes troubleshooting easier for network managers and administrators:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/how-to-detect-routing-and-physical-loops-using-a-network-analyzer-01.png&quot; alt=&quot;how-to-detect-routing-and-physical-loops-using-a-network-analyzer-01&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;Capsa quickly detects and displays Routings and Physical Loops&quot; /&gt;&amp;nbsp;&lt;br /&gt;Figure 1. Capsa quickly detects and displays Routings and Physical Loops&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Further examination of Capsa’s findings is possible by simply clicking on each detected problem. This allows us to further check the characteristics of the related packets and then decide what action must be taken to rectify the problem.&lt;/p&gt;
&lt;p class=&quot;box-info&quot;&gt;Visit our &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; target=&quot;_blank&quot; title=&quot;Network Protocol Analyzer Section&quot;&gt;Network Protocol Analyzer Section&lt;/a&gt; for high-quality technical articles covering Wireshark topics, detecting and creating different type of network attacks plus many more great security articles.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Drilling Into Our Captured Information&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let’s take a routing loop for example. First, find out the related conversation using&lt;strong&gt; Filter&lt;/strong&gt; (red arrow) in the &lt;strong&gt;MAC Conversation&lt;/strong&gt; tab. MAC addresses can be obtained easily from the notices given in the&lt;strong&gt; Diagnosis&lt;/strong&gt; tab:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/how-to-detect-routing-and-physical-loops-using-a-network-analyzer-02.png&quot; alt=&quot;how-to-detect-routing-and-physical-loops-using-a-network-analyzer-02&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;Obtaining more information on a Routing Loop problem&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 2. Obtaining more information on a Routing Loop problem&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next,&lt;strong&gt; Double-click&lt;/strong&gt; the conversation to load all related packets and additional information. &lt;strong&gt;Click&lt;/strong&gt; on &lt;strong&gt;Identifier,&lt;/strong&gt; to view the values of all packets under the &lt;strong&gt;Decode&lt;/strong&gt; column, which in our case are all the same, This effectively means that the packets captured in our example is the same packet which is continuously transiting our network because its caused in a loop.&amp;nbsp; For example, Router-A might be sending it to Router-B, which in turn sends it back to Router-A.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/how-to-detect-routing-and-physical-loops-using-a-network-analyzer-03.png&quot; alt=&quot;how-to-detect-routing-and-physical-loops-using-a-network-analyzer-03&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;Decoding packets caught in a routing loop&quot; /&gt;&lt;br /&gt;Figure 3. Decoding packets caught in a routing loop&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now &lt;strong&gt;click&lt;/strong&gt; on the&lt;strong&gt; Time To Live section&lt;/strong&gt; below, and you’ll see the &lt;strong&gt;Decode&lt;/strong&gt; value reduces gradually. It is because that &lt;strong&gt;TTL&lt;/strong&gt; value will decreased by &lt;strong&gt;1&lt;/strong&gt; after transiting a routing device. When &lt;strong&gt;TTL&lt;/strong&gt; reaches the value of &lt;strong&gt;1&lt;/strong&gt;, the packet will be &lt;strong&gt;discarded&lt;/strong&gt;, to help avoid ICMP packets travelling indefinitely in case of a routing loop in the network. More information on the ICMP protocol can be found in our &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/icmp-protocol.html&quot; target=&quot;_blank&quot; title=&quot;ICMP Protocol&quot;&gt;ICMP Protocol page&lt;/a&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/how-to-detect-routing-and-physical-loops-using-a-network-analyzer-04.png&quot; alt=&quot;how-to-detect-routing-and-physical-loops-using-a-network-analyzer-04&quot; title=&quot;Routing loop causing ICMP TTL to decrease&quot; /&gt;&lt;br /&gt;Figure 4. Routing loop causing ICMP TTL to decrease&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The method used to analyze physical loops is almost identical, but the TTL values of all looped packets remain the same, instead of decreasing as we previously saw. Because the packet is trapped in our local network, it doesn’t traverse a router, therefore the TTL does not change.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Below we see a &lt;strong&gt;DNS Query packet&lt;/strong&gt; that is trapped in a &lt;strong&gt;network loop&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/how-to-detect-routing-and-physical-loops-using-a-network-analyzer-05.png&quot; alt=&quot;how-to-detect-routing-and-physical-loops-using-a-network-analyzer-05&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;Discovering Network loops and why their TTL values do not decrease&quot; /&gt;&lt;br /&gt;Figure 5. Discovering Network loops and why their TTL values do not decrease&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Advanced network analyzers&lt;/strong&gt; allows us to quickly &lt;strong&gt;detect serious network problems&lt;/strong&gt; that can cause &lt;strong&gt;network outages&lt;/strong&gt;, &lt;strong&gt;packet loss&lt;/strong&gt;, &lt;strong&gt;packet flooding&lt;/strong&gt; and more.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/how-to-detect-routing-and-physical-loops-using-a-network-analyzer-01a.png&quot; alt=&quot;how-to-detect-routing-and-physical-loops-using-a-network-analyzer-01a&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Detect routing and physical loops using a network analyzer&quot; /&gt;When working with &lt;strong&gt;medium&lt;/strong&gt; to &lt;strong&gt;large scale networks&lt;/strong&gt;, IT departments are often faced dealing with &lt;strong&gt;network loops&lt;/strong&gt; and &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/switches-bridges.html&quot; target=&quot;_blank&quot; title=&quot;broadcast storms&quot;&gt;broadcast storms&lt;/a&gt; that are caused by &lt;strong&gt;user error&lt;/strong&gt;, &lt;strong&gt;faulty network devices&lt;/strong&gt; or &lt;strong&gt;incorrect configuration&lt;/strong&gt; of network equipment.&amp;nbsp; &lt;strong&gt;Network loops&lt;/strong&gt; and &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/switches-bridges.html&quot; target=&quot;_blank&quot; title=&quot;broadcast storms&quot;&gt;broadcast storms&lt;/a&gt; are capable of causing &lt;strong&gt;major network disruptions&lt;/strong&gt; and therefore must be dealt with very quickly.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are&lt;strong&gt; two kinds of network loops&lt;/strong&gt; and these are &lt;strong&gt;routing loops&lt;/strong&gt; and&lt;strong&gt; physical loops&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Routing loops&lt;/strong&gt; are caused by the incorrect configuration of &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols.html&quot; target=&quot;_blank&quot; title=&quot;routing protocols&quot;&gt;routing protocols&lt;/a&gt; where data packets sent between hosts of different networks, are caught in an endless loop travelling between network routers with incorrect route entries.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A &lt;strong&gt;Physical loop&lt;/strong&gt; is caused by a loop link between devices. A common example is two switches with two active Ethernet links between them. &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-broadcast.html&quot; target=&quot;_blank&quot; title=&quot;Broadcast packets&quot;&gt;Broadcast packets &lt;/a&gt;exiting the links on one switch are replicated and sent back from the other switch. This is also known as a &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/switches-bridges.html&quot; target=&quot;_blank&quot; title=&quot;broadcast storm&quot;&gt;broadcast storm&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Both type of loops are capable of causing major network outages, waste of valuable bandwidth and can disrupt network communications.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We will show you how to detect routing loop and physical loop with a network analyzer such as Colasoft Capsa or Wireshark.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Note: To capture packets on a port that's connected to a Cisco Catalyst switch, users can also read our &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-span-monitoring.html&quot; target=&quot;_blank&quot; title=&quot;Configuring SPAN On Cisco Catalyst Switches - Monitor &amp;amp; Capture Network Traffic/Packets&quot;&gt;Configuring SPAN On Cisco Catalyst Switches - Monitor &amp;amp; Capture Network Traffic/Packets&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If there are &lt;strong&gt;routing loops&lt;/strong&gt; or &lt;strong&gt;physical loops&lt;/strong&gt; in the network, Capsa will immediately report them in the &lt;strong&gt;Diagnosis&lt;/strong&gt; tab as shown below. This makes troubleshooting easier for network managers and administrators:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/how-to-detect-routing-and-physical-loops-using-a-network-analyzer-01.png&quot; alt=&quot;how-to-detect-routing-and-physical-loops-using-a-network-analyzer-01&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;Capsa quickly detects and displays Routings and Physical Loops&quot; /&gt;&amp;nbsp;&lt;br /&gt;Figure 1. Capsa quickly detects and displays Routings and Physical Loops&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Further examination of Capsa’s findings is possible by simply clicking on each detected problem. This allows us to further check the characteristics of the related packets and then decide what action must be taken to rectify the problem.&lt;/p&gt;
&lt;p class=&quot;box-info&quot;&gt;Visit our &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; target=&quot;_blank&quot; title=&quot;Network Protocol Analyzer Section&quot;&gt;Network Protocol Analyzer Section&lt;/a&gt; for high-quality technical articles covering Wireshark topics, detecting and creating different type of network attacks plus many more great security articles.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Drilling Into Our Captured Information&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let’s take a routing loop for example. First, find out the related conversation using&lt;strong&gt; Filter&lt;/strong&gt; (red arrow) in the &lt;strong&gt;MAC Conversation&lt;/strong&gt; tab. MAC addresses can be obtained easily from the notices given in the&lt;strong&gt; Diagnosis&lt;/strong&gt; tab:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/how-to-detect-routing-and-physical-loops-using-a-network-analyzer-02.png&quot; alt=&quot;how-to-detect-routing-and-physical-loops-using-a-network-analyzer-02&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;Obtaining more information on a Routing Loop problem&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 2. Obtaining more information on a Routing Loop problem&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next,&lt;strong&gt; Double-click&lt;/strong&gt; the conversation to load all related packets and additional information. &lt;strong&gt;Click&lt;/strong&gt; on &lt;strong&gt;Identifier,&lt;/strong&gt; to view the values of all packets under the &lt;strong&gt;Decode&lt;/strong&gt; column, which in our case are all the same, This effectively means that the packets captured in our example is the same packet which is continuously transiting our network because its caused in a loop.&amp;nbsp; For example, Router-A might be sending it to Router-B, which in turn sends it back to Router-A.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/how-to-detect-routing-and-physical-loops-using-a-network-analyzer-03.png&quot; alt=&quot;how-to-detect-routing-and-physical-loops-using-a-network-analyzer-03&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;Decoding packets caught in a routing loop&quot; /&gt;&lt;br /&gt;Figure 3. Decoding packets caught in a routing loop&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now &lt;strong&gt;click&lt;/strong&gt; on the&lt;strong&gt; Time To Live section&lt;/strong&gt; below, and you’ll see the &lt;strong&gt;Decode&lt;/strong&gt; value reduces gradually. It is because that &lt;strong&gt;TTL&lt;/strong&gt; value will decreased by &lt;strong&gt;1&lt;/strong&gt; after transiting a routing device. When &lt;strong&gt;TTL&lt;/strong&gt; reaches the value of &lt;strong&gt;1&lt;/strong&gt;, the packet will be &lt;strong&gt;discarded&lt;/strong&gt;, to help avoid ICMP packets travelling indefinitely in case of a routing loop in the network. More information on the ICMP protocol can be found in our &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/icmp-protocol.html&quot; target=&quot;_blank&quot; title=&quot;ICMP Protocol&quot;&gt;ICMP Protocol page&lt;/a&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/how-to-detect-routing-and-physical-loops-using-a-network-analyzer-04.png&quot; alt=&quot;how-to-detect-routing-and-physical-loops-using-a-network-analyzer-04&quot; title=&quot;Routing loop causing ICMP TTL to decrease&quot; /&gt;&lt;br /&gt;Figure 4. Routing loop causing ICMP TTL to decrease&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The method used to analyze physical loops is almost identical, but the TTL values of all looped packets remain the same, instead of decreasing as we previously saw. Because the packet is trapped in our local network, it doesn’t traverse a router, therefore the TTL does not change.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Below we see a &lt;strong&gt;DNS Query packet&lt;/strong&gt; that is trapped in a &lt;strong&gt;network loop&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/how-to-detect-routing-and-physical-loops-using-a-network-analyzer-05.png&quot; alt=&quot;how-to-detect-routing-and-physical-loops-using-a-network-analyzer-05&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;Discovering Network loops and why their TTL values do not decrease&quot; /&gt;&lt;br /&gt;Figure 5. Discovering Network loops and why their TTL values do not decrease&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Advanced network analyzers&lt;/strong&gt; allows us to quickly &lt;strong&gt;detect serious network problems&lt;/strong&gt; that can cause &lt;strong&gt;network outages&lt;/strong&gt;, &lt;strong&gt;packet loss&lt;/strong&gt;, &lt;strong&gt;packet flooding&lt;/strong&gt; and more.&lt;/p&gt;</content>
		<category term="Network Protocol Analyzers" />
	</entry>
</feed>
