Page 70 - Cyber Warnings
P. 70







As we said – the most frequent software being used to packet analysis is a Wireshark.

That tool is so simple to get applied and it may offer many advantages once you make a
decision to configure your network dealing with the internet traffic and sniffers being equipped
with the software and physical gadgets.

The Figure on the left would demonstrate how Wireshark capturing option appears.

We would strongly encourage everyone being interested to learn more about this tool to take
advantages over many web resources offering an opportunity to learn and explore everything
you want to know about this software.

As we already mentioned -
Wireshark is quite convenient
to ethical hacking purposes
and defense applications.

One more thing being used in
a network communication is a
protocol. The protocol is a set
of the rules that computers use
to communicate with each
other.

The most typical protocols are
TCP, UDP and IP. Dealing
with the protocols is more like
dealing with the standard
human communication.

There would be some common rules – similarly as in the person – to – person communication.

For instance, the good analogy could be – Person 1: “Hi! How are you?”; Person 2: “Good,
thank you. Yourself?” and Person 1: “I am fine, thank you!” Practically, that’s how the protocols
communicate between each others. It’s quite simple, convenient and clear!

Many Wireshark’s experts would suggest you to have a look at that how the packets of the
information got transmitted.

For instance, if you notice that some of the packets within that environment would indicate that it
has done a re-transmission, it would non-doubtly suggest that there must be some error with the
sending and receiving options.



70 Cyber Warnings E-Magazine October 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   65   66   67   68   69   70   71   72   73   74   75