Loading…
This event has ended. View the official site or create your own event + mobile app → Check it out
This event has ended. Create your own
View analytic
Saturday, February 23 • 4:40pm - 5:25pm
Daniel Borkmann - Linux' packet mmap(), BPF, and the netsniff-ng toolkit

Sign up or log in to save this event to your list and see who's attending!


This talk will cover internals of the PF_PACKET socket in the Linux kernel, in particular the packet mmap() mechanism ("zero-copy") that is used to improve packet capturing and transmission performance from user space. In addition to that, the Berkeley Packet Filter will be partially covered with its built-in kernel space "virtual machine" and just-in-time compiler. As an application on top of that, the netsniff-ng toolkit will be presented (http://netsniff-ng.org/), which can be used to facilitate a network developer's daily kernel plumbing, but also the daily work of system administrators or security consultants.

Speakers
DB

Daniel Borkmann

Linux Kernel Engineer, Red Hat
Linux C plumbing in different areas, e.g. Linux kernel, netsniff-ng, lksctp-tools, uemacs, tlsdate, and others.


Saturday February 23, 2013 4:40pm - 5:25pm
#Lecture room D1

Attendees (7)

Attendance numbers do not account for private attendees. Get there early!