Wednesday, May 1, 2019

PRJ1 Security Tool Assignment Example | Topics and Well Written Essays - 750 words

PRJ1 Security Tool - Assignment fontHowever, when used non-ethically, hackers can also utilize this joyride to extract information of the internet traffic deprived of any sort of authorization (Ethereal. 2007). Wire Shark is categorized in the list of open line tools and was released on a GNU public license. As per the GPL, the complete pour downing time code is free. The open source tool can be modified as per business requirements. The importance of this tool is significant, as securing the network requires specialized softw atomic number 18 or tool that penetrates within the network for detecting anomalies. Previously, these specialized tools were very pricey and proprietary. However, with the launch of Ethereal, this trend has changed. Some of the functions that Wire Shark provides to its users are As mentioned before, compatible on some(prenominal) UNIX and Microsoft platforms Regardless of interface type, captures network traffic and display packets on the screen Incorp orates tcpdump for displaying captured packets. ... (Sharpe, Ed Warnicke et al.) As shown in fig 1.1, wire shark has captured some packets and is ready for further query. Figure 1.1 Wire shark graphical user interface illustrates three panes. (Sharpe, Ed Warnicke et al.) The first pane i.e. the top one is called the packet list, as it shows the summary of all(prenominal) captured data packet. Users can click on any one of the captured packet to get the properties that are illustrated in the next two panes. Likewise, the middle pane is comprised of tree structure that can be expanded further. (Sharpe, Ed Warnicke et al.) The further expanded properties show frame count, interface type, protocol type and TCP properties. Moreover, the upper left wing corner at fig 1.1 displays a trickle tab that can be used to filter the packet types, as per interest. Furthermore, new protocols can also be added, as it is an open source tool and they can be called as modules or can be constructed in sources. (Sharpe, Ed Warnicke et al.) Some of the protocols that are not common and can be added in the tool are 802.1q Virtual LAN, 802.1x Authentication, AFS (4.0) Replication waiter call declarations, AOL Instant Messenger, ATM, ATM LAN Emulation, Ad hoc on-demand Distance transmitter Routing Protocol, Ad hoc on-demand Distance Vector Routing Protocol v6 etc. (Sharpe, Ed Warnicke et al.) Platforms that the tool supports other than UNIX and Microsoft are AIX, Debian GNU/Linux, Slackware Linux, Red Hat Linux, FreeBSD, NetBSD, OpenBSD, HP/UX and Sparc/Solaris. Figure 1.2 As shown in Fig 1.2, the wire shark capture menu shown multiple options i.e. interfaces, options, start and capture filters. The interface option provides users an opportunity to add or remove network interfaces

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.