The outcome can aid network administrators to control Intranet access and provide security. Top 8 Free Web Application Vulnerability Assessment Tools in 2018 Watch on 1. Four network instructions were used in the analysis of the IP traffic and the results displayed the IP and Media Access Control (MAC) address sources and destinations of the frames, Ethernet, IP addresses, User Datagram Protocol (UDP) and Hypertext Transfer Protocol (HTTP). Here is the Wireshark top 17 display filters list, which I have used mostly by analyzing network traffic. The IP traffics were captured and analyzed using Wireshark Version 2.0.3. The LAN was deployed on windows 8 with a D-link 16-port switch, category 6 Ethernet cable and other LAN devices. To get the mac address, type ncpa.cpl in the Windows search, which will bring you here: Right click the connection, go to ‘Status’: Then, go to details: And write down the value listed in Physical Address. It was implemented using five computer systems configured with static Internet Protocol (IP) addresses used in monitoring the IP traffic on the network by capturing and analyzing live packets from various sources and destinations in the network. To filter out a mac address in Wireshark, make a filter like so: not eth.addrF4-6D-04-E5-0B-0D. This paper was designed to provide Intranet traffic monitoring by sniffing the packets at the local Area Network (LAN) server end to provide security and control.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
June 2023
Categories |