Page 71 - Cyber Warnings
P. 71







On its way from a source to a destination – the packets may straggle to get delivered.
Sometimes the routers as the devices in a communication network could cause a concern.

Please have a look at the Figure on our right and try to notice that the entire network would deal
with the routers, users, links and packets being sent and received.

If you choose the physically appropriate locations to put your sniffers there, you would so easily
get in a position to read that internet traffic.

Finally, a described approach would seek some technology to get used as well as software in
order to get your network traffic being monitored.

As we said – this method could be helpful to monitoring purposes, while the Wireshark would
most commonly get used to hacker’s operations as one of the network penetration’s testing
tools.

Anyway, all of those would include a defense purpose and require from such equipment to get
applied smartly and effectively.

Using some tools to a packet analysis may get the quite interesting business to get done, so we
would strongly recommend to everyone to try to play with these tools and test their capacities.



About The Author

Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Milica is a researcher
from Subotica, Serbia.

She also serves as a Reviewer at the Journal of Computer Sciences and
Applications and. She writes for American and Asia-Pacific security magazines. She is a
volunteer with the American corner of Subotica as well as a lecturer with the local engineering
society.










71 Cyber Warnings E-Magazine October 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   66   67   68   69   70   71   72   73   74   75   76