This event has ended. View the official site or create your own event + mobile app → Check it out
This event has ended. Create your own
View analytic
Saturday, February 23 • 4:40pm - 5:25pm
Daniel Borkmann - Linux' packet mmap(), BPF, and the netsniff-ng toolkit

Sign up or log in to save this event to your list and see who's attending!

This talk will cover internals of the PF_PACKET socket in the Linux kernel, in particular the packet mmap() mechanism ("zero-copy") that is used to improve packet capturing and transmission performance from user space. In addition to that, the Berkeley Packet Filter will be partially covered with its built-in kernel space "virtual machine" and just-in-time compiler. As an application on top of that, the netsniff-ng toolkit will be presented (http://netsniff-ng.org/), which can be used to facilitate a network developer's daily kernel plumbing, but also the daily work of system administrators or security consultants.


Daniel Borkmann

Linux Kernel Engineer, Red Hat
Linux C plumbing in different areas, e.g. Linux kernel, netsniff-ng, lksctp-tools, uemacs, tlsdate, and others.

Saturday February 23, 2013 4:40pm - 5:25pm
#Lecture room D1

Attendees (7)

Attendance numbers do not account for private attendees. Get there early!

Remove this from your schedule?
You may not be able to get back in if this is full.