Home arrow Site Administration arrow Page 2 - How to Use Wireshark Network Analyzer

Warning: transmitting/receiving sensitive information - Administration

Do you need to sniff out and spy on network communications in a LAN, WAN or any network configuration? Or have you found yourself in a difficult situation troubleshooting network-related problems inside and outside of your network? Then you need a network analyzer to examine the packets going into and out of certain media. Wireshark can help. Keep reading to find out how.

TABLE OF CONTENTS:
  1. How to Use Wireshark Network Analyzer
  2. Warning: transmitting/receiving sensitive information
  3. Some important terms
  4. Basic installation
By: Codex-M
Rating: starstarstarstarstar / 6
January 05, 2010

print this article
SEARCH DEV SHED

TOOLS YOU CAN USE

advertisement

The bad news is that if you are working in a company and you are surfing/logging in to your personal websites, finances, etc., the network administrator can spy on your communication if you are not encrypting your packets. It means your account, passwords and identity are compromised.

Of course, they won't tell you they use Wireshark, but a lot of administrators will do so -- especially if your manager has doubts about your use of time and requests administrators to spy on your communication. This is the same problem you encounter if you use public-based Internet stations, such as those in a coffee shop with wireless Internet connections or an Internet café.

Discussing methods for encrypting network communications is beyond the scope of this article. There are, however, two common ways you can effectively encrypt your entire data communication:

  1. When browsing websites, you can use SSH, which is an encrypting protocol.

  2. SSH can also be used with your chat software (Skype, Yahoo messenger).

  3. When logging in websites, and submitting passwords, use HTTPS (secure HTTP). Some reputable sites do this, like Google, Yahoo and MSN.

In this way, packets are encrypted and there is no way to compromise information using Wireshark packet analysis. If you are interested in encryption, particularly OpenSSH protocol, you may be interested in reading these tutorials:

Encrypted Browsing in Windows using OpenSSH

Installing SSH Server in Windows XP Home



 
 
>>> More Site Administration Articles          >>> More By Codex-M
 

blog comments powered by Disqus
escort Bursa Bursa escort Antalya eskort
   

SITE ADMINISTRATION ARTICLES

- Coding: Not Just for Developers
- To Support or Not Support IE?
- Administration: Networking OSX and Win 7
- DotNetNuke Gets Social
- Integrating MailChimp with Joomla: Creating ...
- Integrating MailChimp with Joomla: List Mana...
- Integrating MailChimp with Joomla: Building ...
- Integrating MailChimp with Joomla
- More Top WordPress Plugins for Social Media
- Optimizing Security: SSH Public Key Authenti...
- Patches and Rejects in Software Configuratio...
- Configuring a CVS Server
- Managing Code and Teams for Cross-Platform S...
- Software Configuration Management
- Back Up a Joomla Site with Akeeba Backup

Developer Shed Affiliates

 


Dev Shed Tutorial Topics: