Wireshark Flashcards
aim to prevent devices, technologies , and processes from unauthorized data access , identity thefts, and cyberthreats
Network Security tools
is an open-source network protocol analyzer
that helps organizations capture real-time
data and track, manage, and analyze
network traffic even with minute details
WIRESHARK
TOP 8 NETWORK SECURITY TOOLS
- wireshark
- nexpose
- splunk
- nagios
- tor
- nessus professional
- metsploit
- kali linux
used for monitoring network security. It
provides both real-time data analysis and historical
data searches. It is a cloud-based platform that
provides insights for petabyte-scale data analytics
across the hybrid cloud.
SPLUNK
network security tool that helps to
monitor hosts, systems, and networks. It sends
alerts in real-time. You can select which specific
notifications you would like to receive
nagios
a network security software that
provides real-time information about
vulnerabilities and reduces the threats in a
network.
NEXPOSE
network security tool that ensures
the privacy of users while using the internet.
It helps in preventing cybersecurity threats
and is useful in safeguarding information
security
TOR
security software that contains various tools for executing penetrating testing services.
METASPLOIT
is a network security software that can detect vulnerabilities like software bugs and general security problems in software applications, IT devices, and operating systems and manage them appropriately.
NESSUS PROFESSIONAL
a penetration testing tool used
to scan IT systems and network
vulnerabilities. The organization can monitor
and maintain its network security systems
on just one platform.
KALI LINUX
WHEN
SHOULD
WIRESHARK
BE USED?
- Wireshark can be used to understand how communication takes place across a network and to analyze what went wrong when an issue in communication arises
- Wireshark helps: Network administrators troubleshoot problems across a network
- Security engineers examine security issues across a network
- QA engineers verify applications
- Developers debug protocol implementations
- Network users learn about a specific protocol
WHEN
SHOULDN’T
WIRESHARK BE
USED?
- Help a user who doesn’t understand network protocols
- cannot grab traffic from all of the other systems on a network
- Notify you of alerts
common packet analyzer which allows the user to display other packets and TCP/IP packets, being transmitted and received over a network attached to the computer
Tcpdump
- method to monitor network traffic.
- When it is enabled, the switch sends the copies of all the network packets present at one port to another port
Port mirroring
COLOR CODING
IN WIRESHARK
- PACKETS
- PACKET COLORIZATION
- TEMPORARY RULES
- PERMANENT RULES
The packets in the Wireshark are highlighted
with blue, black, and green color
PACKETS
These colors help users to identify the types of traffic
PACKET
COLORIZATION
are there until the program is in active mode or until we quit the program.
TEMPORARY
RULES
The permanent color rules are available until the Wireshark is in use or the next time you run the Wireshark.
PERMANENT
RULES
Features of Wireshark
- CAPTURES
- SUPPORTS
- MAIN PURPOSE