Application to exploring network packet capture, Computer Networking

This lab introduces basic network capture concepts using Wireshark.

Setup

You will need a PC running Windows for this lab and you will need to install the Wireshark software which you can download from the Internet or which you can get from your instructor.
From the Windows command line:
> ftp nosrednab.exavault.com
> Webster:" this is username"
> password"abc123"
> mget wire*
> bye

2.1. Installing the Wireshark Software

• Run the wireshark.exe install program from the command window (wireshark.exe)
• Accept the default options. If prompted, DO NOT REBOOT YOUR PC. SELECT REBOOT LATER.
• When the installation is complete, and Wireshark is running, select a network interface via the top menu. (Capture | Interfaces)
o Open a command window and determine your PC's IP address via the ipconfig command.
o Select/Start the interface matching your IP address (Ask for help if you have multiple interfaces and don't know which one to choose)
o If packet capture begins automatically, stop or pause it (Capture | Stop).

Posted Date: 3/21/2013 2:22:26 AM | Location : United States







Related Discussions:- Application to exploring network packet capture, Assignment Help, Ask Question on Application to exploring network packet capture, Get Answer, Expert's Help, Application to exploring network packet capture Discussions

Write discussion on Application to exploring network packet capture
Your posts are moderated
Related Questions

What is anonymous FTP? Anonymous FTP is a way of granting user access to files in public servers. Users that are permitted access to data in these servers do not require identi

DNS - Server Attacks It’s not so easy to list all the associated attacks as they are evolving way so fast. As any error of flaw is identified, a patch is released in response

Q. What is Aspects of Security? - Security Attack: Any action whichcompromises the security of information owned by an organization. - Security Mechanism: A mechanism th

Q. Categories of Encryption - Decryption ? Categories of Encryption/Decryption - Symmetric-key - encryption key (Ke) and the decryption key (Kd) are the same and secret

TOP Level Domain  (TLD) Servers These  servers are responsible  for top  level  domains such  as com org net edu, and  going  and all  the country  top level  domains  such  a

Q. How to connect Remote LANs? - Remote bridges acting as connecting devices to connect LANs and point-to-point networks such as leased telephone lines or ADSL lines

DNS Message There are  the only  two kinds  of DNS message DNS query and reply messages. Further mote both query  and reply message have  the same  format  as shown in figure.

In this question, you will compare delays in packet switching (i.e. in IP networks), in circuit switching (i.e. in PSTN telephony) and in virtual circuit packet switching (i.e. in

What is MAN? MAN - Metropolitan Area Networks. MAN is bigger than a LAN and as its name implies, covers the area of a single city. MANs rarely extend beyond 100 KM and frequ