![]() ![]() Note for this demonstration, we are using a wireless network connection. Wireshark is a free open-source network protocol analyzer. Select the network interface you want to sniff. To check if promiscuous mode is enabled, click Capture > Options and verify the “Enable promiscuous mode on all interfaces” checkbox is activated at the bottom of this window. Lab 1: Packet Sniffing and Wireshark Introduction The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a software protocol analyzer, or packet sniffer application, used for network troubleshooting, analysis, software and protocol development. If you have promiscuous mode enabled-it’s enabled by default-you’ll also see all the other packets on the network instead of only packets addressed to your network adapter. ![]() Wireshark captures each packet sent to or from your system. You can configure advanced features by clicking Capture > Options, but this isn’t necessary for now.Īs soon as you click the interface’s name, you’ll see the packets start to appear in real time. For example, if you want to capture traffic on your wireless network, click your wireless interface. CIS 3360 Spring 2013 Security Project IntroductionThis video will demonstrate to the viewer a method for extracting passwords from unencrypted HTTP packets. Capturing PacketsĪfter downloading and installing Wireshark, you can launch it and double-click the name of a network interface under Capture to start capturing packets on that interface. Don’t use this tool at work unless you have permission. WIRESHARK would be used for the lab experiments. Just a quick warning: Many organizations don’t allow Wireshark and similar tools on their networks. The purpose of this document is to introduce the packet sniffer WIRESHARK. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |