Assignment 1 - WIRESHARK BASICS PDF

Title Assignment 1 - WIRESHARK BASICS
Author aaron shaw
Course Internetworking with TCP/IP
Institution Charles Sturt University
Pages 6
File Size 410.6 KB
File Type PDF
Total Downloads 82
Total Views 154

Summary

The installation of wireshark is shown along with screenshots....


Description

PART A

Step 1: Go to wireshark.org and click download

Step 2: Select the appropriate version of your OS and your download will begin

Step 3: Open downloads and run the installation file.

Step 4: Once the installation setup begins, click next.

Step 5: Select the installation of Npcap and USBPcap if required.

Step 6: Select run wireshark and click finish. The program launches.

PART B

1) Method 1: Select the connection that is to be captured/recorded and click (Ctrl + E) to start the capture. Click (Ctrl + E) again to stop the recording. You can click (Ctrl + R) to restart the recording. Method 2: Select the connection that is to be captured. In the menu, click capture and under it click start to start the recording. Method 3: From the home screen, double click on the network which you would like to capture it will open a detailed view and the recording will start.

2) Once we select by double clicking a desired network in the home page, we will get a detailed view of the network, which displays a clear view of the packets.

3) There are two types of filtering in wireshark capture filter and display filters.

Capture filter box

Display filter box

a) Capture filters can be set to filter and record the selected filter. We can apply capture filter by typing it into the filter box and click apply. For example If we select a desired network and the type TCP in the capture filter box and apply the filter, then the program will display the TCP packets and will only record those packets. b)

Display filters can be set by entering the filter in display filter box. For example, if we type dns in the display filter box, the you will only see the dns packets.

4) Protocol analyzers can be used to perform man-in-the-middle attacks. An unethical person can misuse the protocol analyzer to invade our privacy by getting our personal information and sniffing out passwords. They can also use it to intercept unencrypted data and modify it....


Similar Free PDFs