Updated:

Wireshark as a Security Tool: User Guide Report (Assessment)

Exclusively available on Available only on IvyPanda® Made by Human No AI

Access, Install, Setup, and Run Wireshark

Wireshark is a security tool that was initially developed at the end of the 20th century. It was regularly upgraded, and the last release became available a little bit more than a month ago. It is a packet analyzer that can be easily accessed by Internet users. The tool can be downloaded for free from the official website. For users not to waste time trying to find out how Wireshark works, a special guide was created. In addition to that, it can be obtained in several formats so that people have an opportunity to find the one that meets their needs and requirements (“Wireshark”, 2017).

The tool runs on Unix-like systems, Microsoft Windows, Linux, and macOS, allowing the users to see all traffic visible on the interface. So it is significant to install an appropriate version of Wireshark. (“Installing Wireshark under Windows”, 2017). The users just need to open a file to start the installation. It will end automatically. This tool can be updated about once in six weeks. The process is the same as the installation, and personal settings do not change, which is rather convenient.

A guide can help the users to set up a capture with no difficulties. It is critical to:

  • Ensure that policies and laws allow capturing packets.
  • Ensure that it is allowed to change the network (if needed).
  • Obtain root/administrator privileges.
  • Have a capture driver installed.
  • Check time zone settings.
  • Start a capture.
  • Select an appropriate interface to run the tool (“How to set up a capture”, 2017).

Value for a Cybersecurity Expert

Wireshark ensures network security and allows us to maintain a bit of forensic analysis, which is critical for an expert. If there is a possibility that the system was affected by a virus or a worm, the user may block packet sniffers or limit their effects. With the help of port mirroring, packets can be captured from the targeted system (see Fig. 1). Each packet can be checked then to see if it reveals any important data.

Captured Packets
Figure 1: Captured Packets

If something suspicious is found, an expert can try to protect a system. For example, Figure 2 shows that it is possible to start the blaster worm (Karthik, 2011).

The Blaster Worm
Figure 2: The Blaster Worm

Lessons Learned and Best Practices

Wireshark has already proved its benefits for sniffing practices. In addition to that, a long history of its usage provided the professionals with the opportunity to discuss how it should be operated to reach its potential (Griffor, 2016). This tool allows us to solve connectivity issues and analyze traffic activity.

Problems can be faced when selecting a static channel, locating the channel number, and dealing with wireless traffic sniffing. However, they can be eliminated if appropriate frequencies are used, and the area between the capture station and the transmitter is checked. It is also critical to put wireless cards into monitor mode, which can hardly be maintained with Windows drivers. But this issue can be overcome using a combination of software and AirPcap (SearchNetworking, 2012).

Post about Wiki

A wiki page provided in this work allows the Internet users to get to know the most critical information about a security tool known as Wireshark. It briefly outlines how to install this product and work with it safely and securely, allowing people to save the time needed to read a guide if they are not sure whether Wireshark is a thing they need or not. It also provides illustrated examples of the way a cybersecurity expert can use this tool. Finally, the most frequent challenges and the way to avoid them are outlined. Thus, using this wiki page, people will be able to utilize Wireshark immediately and secure their network with no difficulties, which is extremely beneficial.

References

Griffor, E. (2016). Handbook of system safety and security. Amsterdam, Netherlands: Elsevier.

How to set up a capture. (2017). Wireshark. Web.

(2017). Web.

Karthik, R. (2011). Web.

SearchNetworking. (2017). Web.

Wireshark. (2017). Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, August 14). Wireshark as a Security Tool: User Guide. https://ivypanda.com/essays/wireshark-as-a-security-tool-user-guide/

Work Cited

"Wireshark as a Security Tool: User Guide." IvyPanda, 14 Aug. 2020, ivypanda.com/essays/wireshark-as-a-security-tool-user-guide/.

References

IvyPanda. (2020) 'Wireshark as a Security Tool: User Guide'. 14 August.

References

IvyPanda. 2020. "Wireshark as a Security Tool: User Guide." August 14, 2020. https://ivypanda.com/essays/wireshark-as-a-security-tool-user-guide/.

1. IvyPanda. "Wireshark as a Security Tool: User Guide." August 14, 2020. https://ivypanda.com/essays/wireshark-as-a-security-tool-user-guide/.


Bibliography


IvyPanda. "Wireshark as a Security Tool: User Guide." August 14, 2020. https://ivypanda.com/essays/wireshark-as-a-security-tool-user-guide/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1