Server Message Block (SMB) Dialects and Oplocks
This post describes typical message exchange sequence for a client connecting to a user level server, opening a file, reading its data, closing the file, and disconnecting from the server. Opportunistic Locking (Oplocks) are also explained.
You can also refer tothis capture: Download smbtorture from Wireshark Wiki to further understand the SMB dialogues. The capture was made using the Samba4 smbtorture suite, against a Windows Vista beta2 server. Read more…
Installing Dynamips on Linux
Instructional video courtesy of blindhog.net:
Network Monitoring for Dummies
A nice little introduction to network monitoring (provided by my employer – registration required for obtaining the free download). This book does lean slightly towards using Cascade products to provide monitoring, troubleshooting and analytics – BUT I’m happy to say that it does remain a nice little read for anyone who has an interest in network monitoring. Read more…
bashrc and bash_profile
Both the ~/.bashrc and ~/.bash_profile are scripts that might be executed when bash is invoked. The ~/.bashrc file gets executed when you run bash using an interactive shell that is not a login shell. The ~/.bash_profile only gets executed during a login shell. What does this all mean? Read more…
RFC 2597 Assured Forwarding Per-Hop Behaviour Group
RFC 2597 defines four Assured Forwarding groups, denoted by the letters “AF” followed by two digits: Read more…
Kerberos (RFC1510) Failure Codes
These failure codes are the original error codes from the Kerberos RFC 1510 Read more…
Using Wireshark to examine SMB Signing Requirements
When a client connects to a server using SMB it sends a “Negotiate Protocol Request”. In response to this, the server replies with a “Negotiate Protocol Response”. This response reveals whether SMB signing is enabled and whether it is required at the client, the server, or both. Read more…
Creating Virtual Machines using Xen Hypervisor
These YouTube Videos show how simple it is to create Virtualized and Para-Virtualised Guest Operating Systems using Xen Hypervisor Read more…
Using TCP Flags to filter 3-Way Handshake using TCPDUMP / Wireshark
Matching TCP traffic with particular flag combinations can be a useful way of examining TCP conversations. Refer to the TCP State Machine to understand the context of these flags: Read more…