weracollector.blogg.se

Use wireshark to monitor network traffic
Use wireshark to monitor network traffic




use wireshark to monitor network traffic

The attack phase consisted on the following steps:- scanning, enumeration and vulnerability assessment. A variety of attack tools were used to simulate an insider attack on the server. The work was carried out in a virtual environment using a Window 2003 Small Business Server and two computers running Windows XP operating systems. This research demonstrates how the computers within a network can be used to breach a server within the same network. Research has shown that cyber attacks are often carried by an employee within an organisation. The use of digital fingerprinting technologies has facilitated the collection of evidence to use in the prosecution of cyber criminals who have left behind vital evidence when compromising servers. With the number of cyber attacks on the increase this has resulted in the security of networks being severely diminished. The internet has placed a major part in the increase of cybercrime on computers and networks by making attack tools available to everyone.






Use wireshark to monitor network traffic