logo

Network Security Analysis - Doc

14 Pages2454 Words48 Views
   

Added on  2021-05-30

Network Security Analysis - Doc

   Added on 2021-05-30

ShareRelated Documents
WiresharkNameSubjectDate
Network Security Analysis - Doc_1
2Network Security AnalysisQuestion 1. Explain how you performed the packet capture and deciphered the data.AnswerPacket capture When one downloads and install Wireshark, he might unveil it and then double-click the title of a web line under Captureto capture packets that are on the interface1. For instance, if one intends to capture traffics on his wireless networks, he should click his wireless interface. One can organize advanced structures by pressing Capture > Options.1Davidoff, Sherri, and Jonathan Ham.Network forensics: tracking hackers through cyberspace. Vol. 2014. Upper Saddle River: Prentice hall
Network Security Analysis - Doc_2
3Immediately after one clicks the interface’s label, the packets will start appearing. Wireshark captures all packets sent from or to the systems. If he has promiscuous mode activated, it is activated by default and he/she will as well experience each of the other packets on the system instead of packets that are only addressed to the net adapter. To check whether the promiscuous approach is activated, click Capture > Options as well as confirm the "activate wanton mode on each interface" checkbox is initiated at the base of the window2.2Sanders, Chris.Practical packet analysis: Using Wireshark to solve real-world network problems. No Starch Press,
Network Security Analysis - Doc_3
4When one intends to end traffic capturing, he/she should click the “Stop” button that is red, found near the left corner of the window at the top3.Data decipher Dissecting a whole packet will typically comprise a number of dissectors because each procedure has its specific dissector4. As Wireshark attempts to get the ideal dissector for every packet (by use of heuristics “guessing” and static “routes”), it might pick wrong dissectors in specific cases. The Enabled Procedures dialog boxes let one disable or enable specific procedures. All procedures are activated by default. If a protocol is inactivated, Wireshark stops to process a packet each time that procedure comes across.3Bejtlich, Richard.The practice of network security monitoring: understanding incident detection and response. No Starch Press,4Sanders, Chris, and Jason Smith.Applied network security monitoring: collection, detection, and analysis. Elsevier,
Network Security Analysis - Doc_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireshark Live Capture of Websites
|14
|2616
|404

Lab Exercises on Digital Security Fundamentals, Cryptographic Principles, Symmetric Encryption, Asymmetric Encryption, and Secure Hash Functions
|33
|6001
|366