Wireshark Flashcards

1
Q

What is packet sniffing?

A

The process of capturing network traffic for analysis to determine what is happening on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a network analysiser do?

A

Decodes raw data packets of common protocols and displays the network traffic in human readable form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What will a network analyiser normally consist of? (5 things)

A
-   Hardware
– Capture Driver
– Buffer
– Real time analysis
– Decoder
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the capture driver?

A

The part of a network analyzer that is responsible for actually capturing the raw network traffic from the cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the data buffer?

A

This component stores the captured data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the decodes?

A

This component displays the contents of the network traffic with descriptions that allow it to be human readable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can a network analyiser be used for?

A

-Network analyzers are valuable tools for
diagnosing and troubleshooting network
problems
-They are used by system administrators, network
engineers, security engineers etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some good reasons for packet sniffing?

A
  • Troubleshooting network problems
  • Intrusion detection
  • Detecting spyware or compromised computers
  • Discovering the origin of denial of service (DoS) attacks
  • Logging traffic for evidence of wrongdoing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some bad reasons for packet sniffing?

A

-Sniffers can be a significant threat to network
security by discovering system vulnerabilities
-Intruders use network sniffing to capture
valuable and confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some possible uses for bad packet sniffing?

A
-Capturing clear-text usernames and
passwords
-Compromising proprietary information
-Capturing and replaying voice over IP
conversations
-Mapping a network
-Passive OS fingerprinting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some ways an unauthroised person could gain access to install packet sniffing software?

A
  • Breaking into a target computer and installing remotely controlled sniffing software
  • Breaking into a communications access point, such as an ISP and installing sniffing software
  • Locating/finding a system at the ISP that already has sniffing software installed
  • Use social engineering to gain physical access to the network or the ISP to install a packet sniffer
  • Having an insider accomplice on the target network or the ISP to install the sniffer
  • Redirecting communications to take a path that includes the intruder’s computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are rootkits?

A

-Sniffing programs are included with most “rootkits” that are typically installed on compromised systems
-They may install other programs such as sniffers,
key loggers and backdoor access software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is promiscuous mode?

A

Normally NICs will only accept and pass up to the
system those packets destined for themselves, In promiscuous mode, the NIC accepts all packets on the segment, regardless of who they are addressed to, and passes them on to the system for processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can you do if the network uses a switch?

A

-Install a hub between the target PC and the switch
-Configure the switch to forward all traffic out a
particular port and sniff on that port
-Overload the switch’s internal table of
destinations, forcing it to act like a hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

On wireshark what is the difference between:

  • Colour filters
  • Capture filters
  • Display filters
A
  • Colour filter - lets you highlight different types of traffic
  • Capture filter - Let you capture only traffic you want
  • Display filter - Lets you sort all captured traffic to display only traffic you want to see
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What format should you save Wireshark follow TCP in?

A

ASCII: HTML or other text based info
Raw: Attachments, email, pictures

17
Q

What is data carving?

A

Look into raw data and take out only the parts that you want and are relevant to it

18
Q

What is Chaosreader?

A

It creates an HMTL file that links to session details and creates reports