Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Itc Wireshark


Published on

Wireshark ITC presentation.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Itc Wireshark

  1. 1. NEA-SEA ITC 2009 Wireshark March 2009 ITC Jay Hall
  2. 2. What is Wireshark? <ul><li>Wireshark is a </li></ul><ul><ul><li>free </li></ul></ul><ul><ul><li>packet sniffer </li></ul></ul><ul><ul><li>used for network troubleshooting and analysis. </li></ul></ul><ul><li>Wireshark was previously know as Ethereal. </li></ul>
  3. 3. Setup <ul><li>Switch ports must be “mirrored” to a single port so monitoring can take place. </li></ul><ul><li>All packets are forwarded to a single switch port and are captured by Wireshark </li></ul><ul><ul><li>This is called “Promiscuous Sniffing”. </li></ul></ul><ul><ul><ul><li>This is not something dogs do. </li></ul></ul></ul>
  4. 4. A Word of Caution <ul><li>Servers which have ip forwarding enabled should probably not be used to capture packets. </li></ul><ul><li>Recently, I used a server with ip forwarding enabled to capture packets. </li></ul><ul><ul><li>Server the server was seeing all of the packets on the network it was forwarding packets back to the network which were not destined for the server. </li></ul></ul><ul><ul><li>The good news is Wireshark caught it all. </li></ul></ul>
  5. 5. Wireshark Log Files Wireshark Demo
  6. 6. Questions ???????????????
  7. 7. The End