Wireshark as a Security Tool: User Guide Report (Assessment)

Exclusively available on IvyPanda Available only on IvyPanda

Access, Install, Setup, and Run Wireshark

Wireshark is a security tool that was initially developed at the end of the 20th century. It was regularly upgraded, and the last release became available a little bit more than a month ago. It is a packet analyzer that can be easily accessed by Internet users. The tool can be downloaded for free from the official website. For users not to waste time trying to find out how Wireshark works, a special guide was created. In addition to that, it can be obtained in several formats so that people have an opportunity to find the one that meets their needs and requirements (“Wireshark”, 2017).

We will write a custom essay on your topic a custom Assessment on Wireshark as a Security Tool: User Guide
808 writers online

The tool runs on Unix-like systems, Microsoft Windows, Linux, and macOS, allowing the users to see all traffic visible on the interface. So it is significant to install an appropriate version of Wireshark. (“Installing Wireshark under Windows”, 2017). The users just need to open a file to start the installation. It will end automatically. This tool can be updated about once in six weeks. The process is the same as the installation, and personal settings do not change, which is rather convenient.

A guide can help the users to set up a capture with no difficulties. It is critical to:

  • Ensure that policies and laws allow capturing packets.
  • Ensure that it is allowed to change the network (if needed).
  • Obtain root/administrator privileges.
  • Have a capture driver installed.
  • Check time zone settings.
  • Start a capture.
  • Select an appropriate interface to run the tool (“How to set up a capture”, 2017).

Value for a Cybersecurity Expert

Wireshark ensures network security and allows us to maintain a bit of forensic analysis, which is critical for an expert. If there is a possibility that the system was affected by a virus or a worm, the user may block packet sniffers or limit their effects. With the help of port mirroring, packets can be captured from the targeted system (see Fig. 1). Each packet can be checked then to see if it reveals any important data.

Captured Packets
Figure 1: Captured Packets

If something suspicious is found, an expert can try to protect a system. For example, Figure 2 shows that it is possible to start the blaster worm (Karthik, 2011).

The Blaster Worm
Figure 2: The Blaster Worm

Lessons Learned and Best Practices

Wireshark has already proved its benefits for sniffing practices. In addition to that, a long history of its usage provided the professionals with the opportunity to discuss how it should be operated to reach its potential (Griffor, 2016). This tool allows us to solve connectivity issues and analyze traffic activity.

Problems can be faced when selecting a static channel, locating the channel number, and dealing with wireless traffic sniffing. However, they can be eliminated if appropriate frequencies are used, and the area between the capture station and the transmitter is checked. It is also critical to put wireless cards into monitor mode, which can hardly be maintained with Windows drivers. But this issue can be overcome using a combination of software and AirPcap (SearchNetworking, 2012).

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Post about Wiki

A wiki page provided in this work allows the Internet users to get to know the most critical information about a security tool known as Wireshark. It briefly outlines how to install this product and work with it safely and securely, allowing people to save the time needed to read a guide if they are not sure whether Wireshark is a thing they need or not. It also provides illustrated examples of the way a cybersecurity expert can use this tool. Finally, the most frequent challenges and the way to avoid them are outlined. Thus, using this wiki page, people will be able to utilize Wireshark immediately and secure their network with no difficulties, which is extremely beneficial.

References

Griffor, E. (2016). Handbook of system safety and security. Amsterdam, Netherlands: Elsevier.

(2017). Web.

(2017). Web.

Karthik, R. (2011). Web.

SearchNetworking. (2017). Web.

(2017). Web.

Remember! This is just a sample
You can get your custom paper by one of our expert writers
Print
Need an custom research paper on Wireshark as a Security Tool: User Guide written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, August 1). Wireshark as a Security Tool: User Guide. https://ivypanda.com/essays/wireshark-as-a-security-tool-user-guide/

Work Cited

"Wireshark as a Security Tool: User Guide." IvyPanda, 1 Aug. 2022, ivypanda.com/essays/wireshark-as-a-security-tool-user-guide/.

References

IvyPanda. (2022) 'Wireshark as a Security Tool: User Guide'. 1 August.

References

IvyPanda. 2022. "Wireshark as a Security Tool: User Guide." August 1, 2022. https://ivypanda.com/essays/wireshark-as-a-security-tool-user-guide/.

1. IvyPanda. "Wireshark as a Security Tool: User Guide." August 1, 2022. https://ivypanda.com/essays/wireshark-as-a-security-tool-user-guide/.


Bibliography


IvyPanda. "Wireshark as a Security Tool: User Guide." August 1, 2022. https://ivypanda.com/essays/wireshark-as-a-security-tool-user-guide/.

Powered by CiteTotal, essay citation generator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1