Submit Search
Upload
Why Every Engineer Needs WLAN Packet Analysis
•
Download as PPTX, PDF
•
3 likes
•
1,022 views
Savvius, Inc
Follow
Originally presented at the WirelessLAN Professionals Conference, February 3rd, 2015
Read less
Read more
Technology
Report
Share
Report
Share
1 of 16
Download now
Recommended
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and Splunk
Savvius, Inc
Introducing Savvius Vigil
Introducing Savvius Vigil
Savvius, Inc
Network Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with Omnipeek
Savvius, Inc
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2
Savvius, Inc
Savvius_Introduction to workshop
Savvius_Introduction to workshop
STelligence Company
How can Savvius help your organization?
How can Savvius help your organization?
STelligence Company
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
Savvius, Inc
ThousandEyes at Zendesk
ThousandEyes at Zendesk
ThousandEyes
Recommended
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and Splunk
Savvius, Inc
Introducing Savvius Vigil
Introducing Savvius Vigil
Savvius, Inc
Network Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with Omnipeek
Savvius, Inc
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2
Savvius, Inc
Savvius_Introduction to workshop
Savvius_Introduction to workshop
STelligence Company
How can Savvius help your organization?
How can Savvius help your organization?
STelligence Company
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
Savvius, Inc
ThousandEyes at Zendesk
ThousandEyes at Zendesk
ThousandEyes
Enterprise Agents: Deployment Best Practices
Enterprise Agents: Deployment Best Practices
ThousandEyes
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
Imperva Incapsula
Migrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to Know
Imperva Incapsula
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Imperva Incapsula
conf2015_TLaGatta_CHarris_Splunk_BusinessAnalytics_DeliveringHighLevelAnalytics
conf2015_TLaGatta_CHarris_Splunk_BusinessAnalytics_DeliveringHighLevelAnalytics
Tom LaGatta
Protect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS Protection
Imperva Incapsula
DNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS Protection
Imperva Incapsula
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
Imperva Incapsula
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
Imperva Incapsula
What's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix It
Skybox Security
NetScout Systems corporate overview
NetScout Systems corporate overview
BAKOTECH
DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010
Affan Basalamah
Network Critical
Network Critical
gigamon
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
Skybox Security
SeattleFall1
SeattleFall1
Victor Angelbeat
Is Wi-Fi Enterprise so perfect?
Is Wi-Fi Enterprise so perfect?
Aleksandr Demchenko
Endpoint Agent Part 2: Monitoring SaaS Apps from Anywhere
Endpoint Agent Part 2: Monitoring SaaS Apps from Anywhere
ThousandEyes
Solera Networks
Solera Networks
gigamon
Gigamon Systems
Gigamon Systems
gigamon
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
APNIC
Wireless Attacks
Wireless Attacks
primeteacher32
Network Forensics Backwards and Forwards
Network Forensics Backwards and Forwards
Savvius, Inc
More Related Content
What's hot
Enterprise Agents: Deployment Best Practices
Enterprise Agents: Deployment Best Practices
ThousandEyes
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
Imperva Incapsula
Migrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to Know
Imperva Incapsula
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Imperva Incapsula
conf2015_TLaGatta_CHarris_Splunk_BusinessAnalytics_DeliveringHighLevelAnalytics
conf2015_TLaGatta_CHarris_Splunk_BusinessAnalytics_DeliveringHighLevelAnalytics
Tom LaGatta
Protect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS Protection
Imperva Incapsula
DNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS Protection
Imperva Incapsula
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
Imperva Incapsula
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
Imperva Incapsula
What's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix It
Skybox Security
NetScout Systems corporate overview
NetScout Systems corporate overview
BAKOTECH
DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010
Affan Basalamah
Network Critical
Network Critical
gigamon
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
Skybox Security
SeattleFall1
SeattleFall1
Victor Angelbeat
Is Wi-Fi Enterprise so perfect?
Is Wi-Fi Enterprise so perfect?
Aleksandr Demchenko
Endpoint Agent Part 2: Monitoring SaaS Apps from Anywhere
Endpoint Agent Part 2: Monitoring SaaS Apps from Anywhere
ThousandEyes
Solera Networks
Solera Networks
gigamon
Gigamon Systems
Gigamon Systems
gigamon
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
APNIC
What's hot
(20)
Enterprise Agents: Deployment Best Practices
Enterprise Agents: Deployment Best Practices
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
Migrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to Know
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
conf2015_TLaGatta_CHarris_Splunk_BusinessAnalytics_DeliveringHighLevelAnalytics
conf2015_TLaGatta_CHarris_Splunk_BusinessAnalytics_DeliveringHighLevelAnalytics
Protect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS Protection
DNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS Protection
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
What's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix It
NetScout Systems corporate overview
NetScout Systems corporate overview
DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010
Network Critical
Network Critical
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
SeattleFall1
SeattleFall1
Is Wi-Fi Enterprise so perfect?
Is Wi-Fi Enterprise so perfect?
Endpoint Agent Part 2: Monitoring SaaS Apps from Anywhere
Endpoint Agent Part 2: Monitoring SaaS Apps from Anywhere
Solera Networks
Solera Networks
Gigamon Systems
Gigamon Systems
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Viewers also liked
Wireless Attacks
Wireless Attacks
primeteacher32
Network Forensics Backwards and Forwards
Network Forensics Backwards and Forwards
Savvius, Inc
Capturing 802.11ac Data
Capturing 802.11ac Data
Savvius, Inc
Spectrum management best practices in a Gigabit wireless world
Spectrum management best practices in a Gigabit wireless world
Cisco Canada
Using WireShark with AirPCAP
Using WireShark with AirPCAP
David Sweigert
Wi fi-stress-test
Wi fi-stress-test
Michal Jarski
Wardriving & Kismet Introduction
Wardriving & Kismet Introduction
Lance Howell
carnet-wifi-test-results
carnet-wifi-test-results
Michal Jarski
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group
Savvius, Inc
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
Savvius, Inc
Wireless Network Pentestration
Wireless Network Pentestration
KHNOG
802.11ac Overview
802.11ac Overview
Michal Jarski
Iuwne10 S01 L02
Iuwne10 S01 L02
Ravi Ranjan
Wireless LAN & 802.11ac Wi-Fi Fundamentals #AirheadsConf Italy
Wireless LAN & 802.11ac Wi-Fi Fundamentals #AirheadsConf Italy
Aruba, a Hewlett Packard Enterprise company
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Aruba, a Hewlett Packard Enterprise company
EMEA Airheads- Troubleshooting 802.1x issues
EMEA Airheads- Troubleshooting 802.1x issues
Aruba, a Hewlett Packard Enterprise company
EMEA Airheads- ArubaOS - Rogue AP troubleshooting
EMEA Airheads- ArubaOS - Rogue AP troubleshooting
Aruba, a Hewlett Packard Enterprise company
Viewers also liked
(17)
Wireless Attacks
Wireless Attacks
Network Forensics Backwards and Forwards
Network Forensics Backwards and Forwards
Capturing 802.11ac Data
Capturing 802.11ac Data
Spectrum management best practices in a Gigabit wireless world
Spectrum management best practices in a Gigabit wireless world
Using WireShark with AirPCAP
Using WireShark with AirPCAP
Wi fi-stress-test
Wi fi-stress-test
Wardriving & Kismet Introduction
Wardriving & Kismet Introduction
carnet-wifi-test-results
carnet-wifi-test-results
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
Wireless Network Pentestration
Wireless Network Pentestration
802.11ac Overview
802.11ac Overview
Iuwne10 S01 L02
Iuwne10 S01 L02
Wireless LAN & 802.11ac Wi-Fi Fundamentals #AirheadsConf Italy
Wireless LAN & 802.11ac Wi-Fi Fundamentals #AirheadsConf Italy
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
EMEA Airheads- Troubleshooting 802.1x issues
EMEA Airheads- Troubleshooting 802.1x issues
EMEA Airheads- ArubaOS - Rogue AP troubleshooting
EMEA Airheads- ArubaOS - Rogue AP troubleshooting
Similar to Why Every Engineer Needs WLAN Packet Analysis
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Savvius, Inc
The blind spot in virtual servers - seeing with network analysis
The blind spot in virtual servers - seeing with network analysis
Savvius, Inc
Introducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11ac
Savvius, Inc
Network Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeek
Savvius, Inc
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
Savvius, Inc
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN Analysis
Savvius, Inc
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
Savvius, Inc
Are you ready for 802.11ac?
Are you ready for 802.11ac?
Savvius, Inc
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed Networks
Savvius, Inc
Pinpoint the leading causes of downtime with LinkIQ Cable and Network Tester
Pinpoint the leading causes of downtime with LinkIQ Cable and Network Tester
Transcat
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Savvius, Inc
Netsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfv
Intel
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
ClubHack
Wireless Penetration Testing
Wireless Penetration Testing
Mohammed Adam
redes-2
redes-2
FlavioCLima
DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?
Rob Gillen
Video-over-IP for AV
Video-over-IP for AV
Southern Vision Systems, Inc
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Savvius, Inc
CUE Customer Sales Presentation-2023 pdf
CUE Customer Sales Presentation-2023 pdf
abenyeung
Chapter 1 Networking
Chapter 1 Networking
mlrbrown
Similar to Why Every Engineer Needs WLAN Packet Analysis
(20)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
The blind spot in virtual servers - seeing with network analysis
The blind spot in virtual servers - seeing with network analysis
Introducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11ac
Network Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeek
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN Analysis
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
Are you ready for 802.11ac?
Are you ready for 802.11ac?
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed Networks
Pinpoint the leading causes of downtime with LinkIQ Cable and Network Tester
Pinpoint the leading causes of downtime with LinkIQ Cable and Network Tester
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Netsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfv
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Wireless Penetration Testing
Wireless Penetration Testing
redes-2
redes-2
DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?
Video-over-IP for AV
Video-over-IP for AV
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
CUE Customer Sales Presentation-2023 pdf
CUE Customer Sales Presentation-2023 pdf
Chapter 1 Networking
Chapter 1 Networking
More from Savvius, Inc
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
Savvius, Inc
Are You Missing Something?
Are You Missing Something?
Savvius, Inc
Managing a Widely Distributed Network
Managing a Widely Distributed Network
Savvius, Inc
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper Preview
Savvius, Inc
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
Savvius, Inc
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring
Savvius, Inc
Wired and Wireless Network Forensics
Wired and Wireless Network Forensics
Savvius, Inc
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise Affordable
Savvius, Inc
Bringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network Monitoring
Savvius, Inc
802.11-2012 Update
802.11-2012 Update
Savvius, Inc
Real Packets from Virtual Servers
Real Packets from Virtual Servers
Savvius, Inc
More from Savvius, Inc
(11)
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
Are You Missing Something?
Are You Missing Something?
Managing a Widely Distributed Network
Managing a Widely Distributed Network
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper Preview
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring
Wired and Wireless Network Forensics
Wired and Wireless Network Forensics
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise Affordable
Bringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network Monitoring
802.11-2012 Update
802.11-2012 Update
Real Packets from Virtual Servers
Real Packets from Virtual Servers
Recently uploaded
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Fwdays
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
Manik S Magar
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
carlostorres15106
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
RankYa
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
NavinnSomaal
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
charlottematthew16
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
Zilliz
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Dubai Multi Commodity Centre
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Sergiu Bodiu
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Alex Barbosa Coqueiro
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Wonjun Hwang
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
Recently uploaded
(20)
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Why Every Engineer Needs WLAN Packet Analysis
1.
www.wildpackets.com© WildPackets, Inc. Why
Every Engineer Needs WLAN Packet Analysis How to solve 10 common Wi-Fi problems by dissecting packets Jay Botelho Director of Product Management WildPackets jbotelho@wildpackets.com Follow me @jaybotelho
2.
© WildPackets, Inc. Critical
Elements of a Packet Analysis Solution • Performance • Multi-channel analysis • Visualization • Analysis modules • High-quality decodes
3.
© WildPackets, Inc. 10
Common Problems • Verifying device capabilities ‒ Networks ‒ Clients • Verifying device configuration ‒ Poor configuration choices • Connection issues ‒ Authentication • Poor VoFi quality • Identifying network bottlenecks ‒ Chatty clients (let me count the ways) ‒ Probe requests ‒ Inefficient network utilization • Roaming ‒ Sticky clients ‒ Roaming latency
4.
© WildPackets, Inc. Verifying
Device Capabilities • Network capabilities – Beacons • Client capabilities – Probe Requests
5.
© WildPackets, Inc. Verifying
Device Configuration • QoS enabled/disabled • Beacon intervals • CTS frames sent out with 10,000 microsecond duration field (viewed as duration attack)
6.
© WildPackets, Inc. Connection
Issues Authentication – EAPOL Key Exchange • The AP sends a nonce-value to the STA (ANonce) • The STA sends its own nonce- value (SNonce) to the AP together with a MIC, including authentication • The AP sends the GTK and a sequence number together with another MIC • The STA sends a confirmation to the AP
7.
© WildPackets, Inc. Poor
VoFi Quality • RTP packets (g.711) • Jitter, packet loss, latency • Relative packet timing
8.
© WildPackets, Inc. Identifying
Network Bottlenecks • Chatty clients (let me count the ways) • Probe requests ‒ Probe Requests to all SSIDs, not just current one, flooding device with responses • Inefficient network utilization
9.
© WildPackets, Inc. Chatty
Client - Unassociated http://www.sniffwifi.com/2012/04/phones-on-wlan.html
10.
© WildPackets, Inc. Chatty
Client - Associated http://www.sniffwifi.com/2012/04/phones-on-wlan.html
11.
© WildPackets, Inc. Inefficient
Network Utilization http://www.sniffwifi.com/2014/05/why-are-you-slowing-down-my-wifi-apple.html
12.
© WildPackets, Inc. Inefficient
Network Utilization (cont.) http://www.sniffwifi.com/2014/05/why-are-you-slowing-down-my-wifi-apple.html
13.
© WildPackets, Inc. Roaming
Issues • Sticky clients ‒ Clients make poor roaming decisions ‒ Look for: signal strength, data rates, etc. • Roaming latency ‒ Criteria for determining latency depends on your perspective http://revolutionwifi.blogspot.com/2012/12/wi-fi-roaming-analysis-part-3-measuring.html
14.
© WildPackets, Inc.
15.
© WildPackets, Inc. Additional
Resources • http://www.sniffwifi.com/2012/04/phones-on-wlan.html • http://www.sniffwifi.com/2014/07/i-guess-apple-wireless-routers-dont.html • http://www.sniffwifi.com/2014/05/why-are-you-slowing-down-my-wifi-apple.html • http://www.sniffwifi.com/2013/12/iphones-be-chatty.html • http://www.sniffwifi.com/2013/09/a-fish-in-desert-chomecast-sniffed.html • http://www.sniffwifi.com/2013/08/eighteen-seconds-of-very-chatty-iphone.html • http://www.sniffwifi.com/2012/08/testing-mobility-with-omnipeek.html • http://www.sniffwifi.com/2011/11/how-do-i-know-if-it-really-links-me.html • http://www.sniffwifi.com/2011/11/tell-me-whys-tell-me-sweet-little-whys.html • http://www.sniffwifi.com/2011/11/what-is-wrong-with-this-wifi-and-what.html • http://sc-wifi.com/2013/08/27/troubleshooting-done-motorola-style/ • http://sc-wifi.com/2012/11/12/tag-vendor-specific-nintendo/ • http://www.wifikiwi.com/cwap/a-sticky-problem-wi-fi-clients-that-wont-roam/ • http://revolutionwifi.blogspot.com/2012/12/wi-fi-roaming-analysis-part-3-measuring.html
16.
www.wildpackets.com© WildPackets, Inc. Thank
You! WildPackets, Inc. 1340 Treat Boulevard, Suite 500 Walnut Creek, CA 94597 (925) 937-3200
Download now