Fundamentals of Cyber security Operations - Week 3 Flashcards
What is an Wireshark ?
Wireshark is a software protocol analyzer, or “packet sniffer” application, used for network troubleshooting, analysis, software and protocol development, and education
What is the keyboard shortcut to start Capture in WireShark ?
ctrl + e
What is captured by Wireshark ?
PDU - Protocol Data Unit
Where to view the source and destination MAC address in Wiresark ?
Select the captured PDU, Click the arrow to the left of the Ethernet II row to view the Destination and Source MAC addresses.
What do you mean by remote host ?
Remote host means, host is on another network,
When you ping a host on a different Network , then what is the destination MAC address ?
Destination MAC address is the Mac address of default gateway.
Layer 2 frames never leave the LAN. When a ping is issued to a remote host, the source will use the Default Gateway’s MAC address for the frame destination. The Default Gateway receives the packet, strips the Layer 2 frame information from the packet and then creates a new frame header with the next hop’s MAC address. This process continues from router to router until the packet reaches its destination IP address.
What is OUI ?
Organizationally Unique Identifier}
The part of the MAC address that identifies the vendor of the network adapter. The OUI is the first three bytes of the six-byte field and is administered by the IEEE. See MAC layer.
How many bits are in OUI ?
24 bits
How many bits are one octate of MAC Address
8 bits
How many bits are in MAC Address ?
48 bits
It has six octets of 8 bit each & expreseed as hexadeximal digits 0-9,A-F
How many octates are reserved for OUI ?
First three octates from Left to Right
10:dd:b1:xx:xx:xx
What is the frame type of IPv4 address ?
0x0800
What is the frame type of ARP ?
0x0806
What are the five basic parts of a Ethernet Frame?
- Destination
2.Source - Type
- Data
- FCS (Frame Check Sequence received 10 51051 we iPhone 50 after inter blue)
How to capture 50 packets from eth0 interface and save it to pcap file ?
tcpdump -i eth0 -v -w capture.pcap