![]() ![]() Similarly, received packets are never explicitly addressed to the packet sniffer. It observes messages being sent and received by applications and protocols running on your computer, but never sends packets itself. As the name suggests, a packet sniffer captures ( sniffs ) messages being sent/received from/by your computer it will also typically store and/or display the contents of the various protocol fields in these captured messages. Figure 1: Packet sniffer structureĢ Figure 1b: Protocol Data Encapsulation PACKET SNIFFER The basic tool for observing the messages exchanged as packets on the network using a variety of protocols is called a packet sniffer. Wireshark includes filters, color-coding, and other features that let you dig deep into network traffic and inspect individual packets. ![]() Wireshark, a network analysis tool formerly known as Ethereal, captures packets in real time and display them in human-readable format. This document introduces the basic operation of a packet sniffer, installation, and a test run of Wireshark. Wireshark would be used for the lab experiments. 1 Wireshark Tutorial INTRODUCTION The purpose of this document is to introduce the packet sniffer Wireshark. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |