Wireshark Flashcards

1
Q

aim to prevent devices, technologies , and processes from unauthorized data access , identity thefts, and cyberthreats

A

Network Security tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is an open-source network protocol analyzer
that helps organizations capture real-time
data and track, manage, and analyze
network traffic even with minute details

A

WIRESHARK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TOP 8 NETWORK SECURITY TOOLS

A
  1. wireshark
  2. nexpose
  3. splunk
  4. nagios
  5. tor
  6. nessus professional
  7. metsploit
  8. kali linux
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

used for monitoring network security. It
provides both real-time data analysis and historical
data searches
. It is a cloud-based platform that
provides insights for petabyte-scale data analytics
across the hybrid cloud.

A

SPLUNK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

network security tool that helps to
monitor hosts, systems, and networks. It sends
alerts in real-time. You can select which specific
notifications you would like to receive

A

nagios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a network security software that
provides real-time information about
vulnerabilities
and reduces the threats in a
network.

A

NEXPOSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

network security tool that ensures
the privacy of users while using the internet.
It helps in preventing cybersecurity threats
and is useful in safeguarding information
security

A

TOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

security software that contains various tools for executing penetrating testing services.

A

METASPLOIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is a network security software that can detect vulnerabilities like software bugs and general security problems in software applications, IT devices, and operating systems and manage them appropriately.

A

NESSUS PROFESSIONAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a penetration testing tool used
to scan IT systems and network
vulnerabilities.
The organization can monitor
and maintain its network security systems
on just one platform.

A

KALI LINUX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHEN
SHOULD
WIRESHARK
BE USED?

A
  1. Wireshark can be used to understand how communication takes place across a network and to analyze what went wrong when an issue in communication arises
  2. Wireshark helps: Network administrators troubleshoot problems across a network
  3. Security engineers examine security issues across a network
  4. QA engineers verify applications
  5. Developers debug protocol implementations
  6. Network users learn about a specific protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHEN
SHOULDN’T
WIRESHARK BE
USED?

A
  1. Help a user who doesn’t understand network protocols
  2. cannot grab traffic from all of the other systems on a network
  3. Notify you of alerts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

common packet analyzer which allows the user to display other packets and TCP/IP packets, being transmitted and received over a network attached to the computer

A

Tcpdump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • method to monitor network traffic.
  • When it is enabled, the switch sends the copies of all the network packets present at one port to another port
A

Port mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

COLOR CODING
IN WIRESHARK

A
  1. PACKETS
  2. PACKET COLORIZATION
  3. TEMPORARY RULES
  4. PERMANENT RULES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The packets in the Wireshark are highlighted
with blue, black, and green color

A

PACKETS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

These colors help users to identify the types of traffic

A

PACKET
COLORIZATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

are there until the program is in active mode or until we quit the program.

A

TEMPORARY
RULES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The permanent color rules are available until the Wireshark is in use or the next time you run the Wireshark.

A

PERMANENT
RULES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Features of Wireshark

A
  1. CAPTURES
  2. SUPPORTS
  3. MAIN PURPOSE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It can only capture packet on the PCAP (an application programming interface used to capture the network) supported networks.

A

CAPTURES

13
Q

Wireshark supports a variety of welldocumented capture file
formats such as the PcapNg and Libpcap. These formats are used for storing the captured data.

A

SUPPORTS

14
Q

It is the no.1 piece of software for its purpose. It has countless applications ranging from the tracing down, unauthorized traffic,
firewall settings, etc.

A

MAIN
PURPOSE

15
Q

The screen/interface of the Wireshark is divided into five parts:

A
  1. menu bar and the options displayed below
  2. packet listing window
  3. packet header- detailed window
  4. packet contents window
  5. filter field
16
Q

This part is at the top of the window. File and the capture
menus options are commonly used in Wireshark. The capture
menu allows to start the capturing process. And the File menu
is used to open and save a capture file.

A

menu bar and the options displayed

16
Q
  • It determines the packet flow or the captured packets in the traffic.
  • It includes the packet number, time, source, destination, protocol, length, and info.
  • We can sort the packet list by clicking on the columnname.
A

packet listing window

16
Q
  • It contains detailed information about the components of the packets.
  • The protocol info can also be expanded or minimized according to the information required
A

packet header- detailed window

16
Q

which
displays the content in ASCII and hexadecimal format

A

The bottom window

16
Q
  • which is at the top of the display.
  • The captured packets on the screen can be filtered based on any component according to your requirements
A

filter field

17
Q
  • this is the number of packets captured
  • the bracket indicates that this packet is a part of the conversation
A

No.

18
Q
  • this column shows how long after you started the capture this particular packet
  • you can change this value in the settings menu to display different option
A

time

19
Q

this is the type of packet

A

source

19
Q

this is the address of the system sent to the packet

A

source

20
Q

column that shows you packet length, measured in bytes

A

length

21
Q

this column shows you more information about the packet contents

A

info

22
Q
  • it is used to specify the IP address as the source of destination
  • filter based on this IP address as source and destination
  • used to source filter
  • used to destination filter
A

ip.addr
ip.src
ip.dst

23
Q
  • this command filters based on protocol
  • it requres the packet to be either dns protocol or http protocol and will display traffic
A

protocol
dns and http

24
Q
  • it sets filter based on specific port number
  • it will filter all the packets with this port number
A

tcp.port

25
Q
  • wireshark can flag tcp problems. this command will only display the issues that wireshark identifies
A

tcp.analysis.flags

26
Q
  • it is used to filter the list of protocols in which we are not interested
  • it will remove arp, dns, and icmp, and only remaining will be left or it clean the things that may not be helpful
A

!(dns, arp, icmp)

27
Q
  • it is used if you want to work on a single connection on a tcp conversation
  • anything related to the single tcp connection will be displayed on the screen
A

select any packet
right click
follow tcp stream

28
Q
  • it is used to display the packets which contains such words
A

tcp contains the filter

29
Q
  • it will display http requests in trace file
A

http.request

30
Q

if your command is correct

A

green

30
Q
  • this will display all the packets with the sync built-in tcp header set to 1
A

tcp.flags.syn==1

31
Q

it is incorrect or the Wireshark does not recognize your command.

A

red

32
Q

defined as the process to capture the packets of data flowing across a computer network

A

Packet sniffing

33
Q

layer includes the protocols used by most applications for providing user services.

A
  • Application Layer
34
Q

establishes process-to-process connectivity, and it provides end-to-end services that are independent of underlying user data. To implement the process-to-process communication, the protocol introduces a concept of port

A
  • Transport Layer
35
Q

responsible for sending packets to across networks. It has two functions: 1) Host identification by using IP addressing system (IPv4 and IPv6); and 2) packets routing from source to destination.

A
  • Internet Layer
36
Q

defines the networking methods within the scope of the local network link.

A
  • Link Layer
36
Q

basic tool for observing network packet exchanges in a computer. As the name suggests, a packet sniffer captures (“sniffs”) packets being sent/received from/by your computer; it will also typically store and/or display the contents of the various protocol fields in these captured packets.

A

Packet Sniffer