![]() It is helpful in finding out if the attacker has left anything in the system like a Trojan horse or a botware which can be used later to compromise. Wireshark can be used to identify what all information or Data has been compromised from a device or network. The most privacy sensitive are packets that are linked to mail/webbrowsing. Wireshark can be used to know how exactly the attack has been implemented on a system. Computer s/w or h/w, intercepts & logs traffic passing over the network. ![]() Some packets are encrypted and only give information about the packets (source, destination, type of packet), other packets are 'plain text' and data can be read. Presented By: Hiral Chhaya, Anvita Priyam. ![]() There are many types of packets, some request a address for a PC, some to say to others, 'Hey im this pc and i am on address x', and there are packets that handle communication and data for webpages ![]() You can inspect network packets that go over the network.Īll the information that is sent from your computer to the internet / and or network is sent in packets.įor example (simplified) when you request a reddit page your computer sends out a packet with the message 'Hey reddit webserver, give me this page and everything that is associated with it.' The reddit server replies with a bunch of packets and you have your data.ĭepending on what point you install the wireshark application in the network and other factors (network hardware / topology) it is possible to capture everybody else his/her packets that their computer send. WireShark pretty much covers every transfer layer - of course, sometimes it is hard to see what data is passed between machines due to the fact that it is encrypted, but nonetheless, it is. Wireshark is a network protocol analyzer.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |