What is Wireshark? Wireshark is a free and open-source packet analyzer. It is used for network education, analysis troubleshooting, software, and communications protocol development. Wireshark originally named Ethereal, due to trademark issues in May 2006 the project was renamed Wireshark. How does Wireshark work? Wireshark is a packet sniffer and analysis tool. It captures dataRead More
Tag: Network Forensics
How To Hack Wireless Networks
How Are Wireless Networks Hacked? There are two main types of encryptions used. WEP (Wired Equivalent Privacy) Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standards ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional wiredRead More
Implementing Static IP address for Raspberry Pi?
For a raspberry pi device that was configured for DHCP service in the network. What if the router has become unavailable and the device IP assignment is not done in the network. In such cases, the device will not be accessible in the network as there is no IP address available to it. But withRead More
Different types of Ethernet cabling in Networking
Three companies DEC, Intel and Xerox together implemented Ethernet specification called the Ethernet Blue Book which was released in 1980. It was also known as the DIX standard after the company initials. Their first Ethernet LAN specification was used by IEE as 802.3committee. This was a 10 Mbps network that ran on coaxial cable, twistedRead More
Hashdeep -File Integrity Checker ( CHFI Forensics tool )
Hashdeep – Compute, compare, or audit multiple message digests HASH COMPUTATION By default, hashdeep creates output with a header and then, for each file, the computed hashes, and the complete name of file .header contains the hashdeep file version, currently 1.0, which hashes are saved in the file. Hashes are MD5 and SHA-256 hashing algorithm .Read More