F5F Stay Refreshed Power Users Networks Sure, I can assist you with that. What would you like to learn?

Sure, I can assist you with that. What would you like to learn?

Sure, I can assist you with that. What would you like to learn?

Pages (3): Previous 1 2 3 Next
T
tetriad
Member
203
02-11-2016, 01:04 AM
#11
Review the Wireshark manual and Fyodor's Nmap guide (both freely available). Understanding the material helps one grasp its purpose. The Nmap guide includes an extensive legal part. Nmap must remain confined to private networks only. Wireshark operates passively... I haven't heard of anyone facing charges for using it in a university setting. It shouldn't be noticeable at all.
T
tetriad
02-11-2016, 01:04 AM #11

Review the Wireshark manual and Fyodor's Nmap guide (both freely available). Understanding the material helps one grasp its purpose. The Nmap guide includes an extensive legal part. Nmap must remain confined to private networks only. Wireshark operates passively... I haven't heard of anyone facing charges for using it in a university setting. It shouldn't be noticeable at all.

C
coyote888
Posting Freak
838
02-18-2016, 02:44 AM
#12
Wireshark is employed in production environments; it's a legitimate tool and you cannot take any action against it as if it were an active component. It merely displays packets traveling over the network. You can still utilize it to record handshakes or monitor SIP calls, though this requires being a MIM. Using Wireshark with standard broadcast or unknown unicast traffic is largely ineffective.
C
coyote888
02-18-2016, 02:44 AM #12

Wireshark is employed in production environments; it's a legitimate tool and you cannot take any action against it as if it were an active component. It merely displays packets traveling over the network. You can still utilize it to record handshakes or monitor SIP calls, though this requires being a MIM. Using Wireshark with standard broadcast or unknown unicast traffic is largely ineffective.

N
NooLele
Posting Freak
847
02-19-2016, 04:33 AM
#13
It activates your NIC in promiscuous mode, clearly showing the network that the device is performing unexpected actions.
N
NooLele
02-19-2016, 04:33 AM #13

It activates your NIC in promiscuous mode, clearly showing the network that the device is performing unexpected actions.

F
Friflamme
Junior Member
20
02-19-2016, 06:31 AM
#14
I'm sure it's just how my college is, but rules are rules—many places dislike sniffing networks, even with tools that can't really change them.
F
Friflamme
02-19-2016, 06:31 AM #14

I'm sure it's just how my college is, but rules are rules—many places dislike sniffing networks, even with tools that can't really change them.

S
Scrawnypwner
Junior Member
39
03-01-2016, 10:28 AM
#15
There are methods to identify if a connected device operates in open mode, though this is usually just a minor concern for your IT team. It's improbable they'd investigate further.
S
Scrawnypwner
03-01-2016, 10:28 AM #15

There are methods to identify if a connected device operates in open mode, though this is usually just a minor concern for your IT team. It's improbable they'd investigate further.

T
TIMidator75
Junior Member
38
03-04-2016, 09:36 AM
#16
Hex encoding wouldn't seem intimidating. You're likely already comfortable with many data formats and technical ideas, such as checksums, flags, or HTTP structures. Depending on the context—like technical docs or data manipulation—you'd be used to handling packets and tools like Scapy or pandas. What part of Wireshark or packet analysis might feel tricky? PS: I meant you have a background in full-stack development and some computer science education, not just casual web browsing.
T
TIMidator75
03-04-2016, 09:36 AM #16

Hex encoding wouldn't seem intimidating. You're likely already comfortable with many data formats and technical ideas, such as checksums, flags, or HTTP structures. Depending on the context—like technical docs or data manipulation—you'd be used to handling packets and tools like Scapy or pandas. What part of Wireshark or packet analysis might feel tricky? PS: I meant you have a background in full-stack development and some computer science education, not just casual web browsing.

J
JASurtino
Member
70
03-06-2016, 05:19 AM
#17
Fair point, but the amount of experience and the specific area he’s interested in really matter. Even after about six to seven years across various networking scopes, I still grasp only half of the captured data. If someone with basic networking knowledge is involved, it might be better to avoid diving too deep right away. It could be more effective to guide him through the OSI model first. Once comfortable with hardware, start at Layer 2 Data-Link, then gradually move to Layer 3 and 4.
J
JASurtino
03-06-2016, 05:19 AM #17

Fair point, but the amount of experience and the specific area he’s interested in really matter. Even after about six to seven years across various networking scopes, I still grasp only half of the captured data. If someone with basic networking knowledge is involved, it might be better to avoid diving too deep right away. It could be more effective to guide him through the OSI model first. Once comfortable with hardware, start at Layer 2 Data-Link, then gradually move to Layer 3 and 4.

S
sabby0131
Junior Member
11
03-12-2016, 12:22 PM
#18
You don’t have to understand programming to examine flags and checksums. I think it offers little value if you’re not familiar with networking basics. The mention of Wireshark being confusing makes sense since you were directed to start using it right away. You should be aware of what you’re reviewing. I’ve met engineers who can’t interpret a capture file.
S
sabby0131
03-12-2016, 12:22 PM #18

You don’t have to understand programming to examine flags and checksums. I think it offers little value if you’re not familiar with networking basics. The mention of Wireshark being confusing makes sense since you were directed to start using it right away. You should be aware of what you’re reviewing. I’ve met engineers who can’t interpret a capture file.

S
Slackingdog
Member
58
03-14-2016, 03:11 AM
#19
It seems the focus varies based on the learner's goals. I handle protocols more often than hardware or network planning, which might color my perspective.
S
Slackingdog
03-14-2016, 03:11 AM #19

It seems the focus varies based on the learner's goals. I handle protocols more often than hardware or network planning, which might color my perspective.

R
ripa5000
Posting Freak
884
04-05-2016, 01:22 AM
#20
I’m not aware of anyone skilled in low-level coding who’d get mixed up by a capture, which supports my argument.
R
ripa5000
04-05-2016, 01:22 AM #20

I’m not aware of anyone skilled in low-level coding who’d get mixed up by a capture, which supports my argument.

Pages (3): Previous 1 2 3 Next