Thursday, October 17, 2019
PRJ1 Security Tool Assignment Example | Topics and Well Written Essays - 750 words
PRJ1 Security Tool - Assignment Example However, when used non-ethically, hackers can also utilize this tool to extract information of the network traffic deprived of any sort of authorization (Ethereal. 2007). Wire Shark is categorized in the list of open source tools and was released on a GNU public license. As per the GPL, the complete source code is free. The open source tool can be modified as per business requirements. The importance of this tool is significant, as securing the network requires specialized software or tool that penetrates within the network for detecting anomalies. Previously, these specialized tools were very expensive and proprietary. However, with the launch of Ethereal, this trend has changed. Some of the functions that Wire Shark provides to its users are: As mentioned before, compatible on both UNIX and Microsoft platforms Regardless of interface type, captures network traffic and display packets on the screen Incorporates ââ¬Ëtcpdumpââ¬â¢ for displaying captured packets. ... (Sharpe, Ed Warnicke et al.) As shown in fig 1.1, wire shark has captured some packets and is ready for further query. Figure 1.1 Wire shark GUI illustrates three panes. (Sharpe, Ed Warnicke et al.) The first pane i.e. the top one is called the packet list, as it shows the summary of every captured data packet. Users can click on any one of the captured packet to get the properties that are illustrated in the next two panes. Likewise, the middle pane is comprised of tree structure that can be expanded further. (Sharpe, Ed Warnicke et al.) The further expanded properties show frame count, interface type, protocol type and TCP properties. Moreover, the upper left corner at fig 1.1 displays a filter tab that can be used to filter the packet types, as per interest. Furthermore, new protocols can also be added, as it is an open source tool and they can be called as modules or can be constructed in sources. (Sharpe, Ed Warnicke et al.) Some of the protocols that are not common and can be a dded in the tool are 802.1q Virtual LAN, 802.1x Authentication, AFS (4.0) Replication Server call declarations, AOL Instant Messenger, ATM, ATM LAN Emulation, Ad hoc on-demand Distance Vector Routing Protocol, Ad hoc on-demand Distance Vector Routing Protocol v6 etc. (Sharpe, Ed Warnicke et al.) Platforms that the tool supports other than UNIX and Microsoft are AIX, Debian GNU/Linux, Slackware Linux, Red Hat Linux, FreeBSD, NetBSD, OpenBSD, HP/UX and Sparc/Solaris. Figure 1.2 As shown in Fig 1.2, the wire shark capture menu shown multiple options i.e. interfaces, options, start and capture filters. The interface option provides users an opportunity to add or remove network interfaces
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.