Michał Sołtysik - Deep packet inspection analyses - why the typical approach is not enough (ENG)

Поділитися
Вставка
  • Опубліковано 25 сер 2024

КОМЕНТАРІ • 9

  • @x0rZ15t
    @x0rZ15t 2 місяці тому +2

    Very informative presentation. Thank you for your effort in taking the time to share the knowledge with the community. Looking forward for more content from you in the future.
    P.S.
    You really should give talks at SharkFest a try, I'm sure they'd love to have you!

    • @michalsoltysik
      @michalsoltysik  2 місяці тому +1

      Thank you for your kind words. I love the guys at the Wireshark family :-) Stay tuned, as I will be giving at least two international lectures later this year. Please subscribe to my UA-cam channel for updates.

  • @trainwreck3697
    @trainwreck3697 2 місяці тому +1

    Been seeing these weird scans on my mail server with the string "MGLNDD", turns out it's RIPE atlas. Always a TCP & SSL handshake on the MX ports (25,465,587). Thanks for the video.

  • @BettyDuBois
    @BettyDuBois 8 місяців тому +3

    Excellent presentation! Well worth the time watching.

    • @michalsoltysik
      @michalsoltysik  8 місяців тому +3

      Thank you, Betty! Hard work should pay off. I love the packets - just like you :)

  • @golus4963
    @golus4963 8 місяців тому +1

    Love it, pls make more videos

    • @michalsoltysik
      @michalsoltysik  8 місяців тому

      I am going to publish a few more next year when I participate in a few conferences.

  • @G3dz4
    @G3dz4 Місяць тому

    Seen this first time today, both from MSFT networks, one in GB and another in US. At least microsoft have regulary updated whois, fixed with tarpit blocks /11 and /12 😇 I guess in next century company like msft, amazon, google, etc ... may understand they are not owners of internet