-->

ABOUT US

Our development agency is committed to providing you the best service.

OUR TEAM

The awesome people behind our brand ... and their life motto.

  • Kumar Atul Jaiswal

    Ethical Hacker

    Hacking is a Speed of Innovation And Technology with Romance.

  • Kumar Atul Jaiswal

    CEO Of Hacking Truth

    Loopholes are every major Security,Just need to Understand it well.

  • Kumar Atul Jaiswal

    Web Developer

    Techonology is the best way to Change Everything, like Mindset Goal.

OUR SKILLS

We pride ourselves with strong, flexible and top notch skills.

Marketing

Development 90%
Design 80%
Marketing 70%

Websites

Development 90%
Design 80%
Marketing 70%

PR

Development 90%
Design 80%
Marketing 70%

ACHIEVEMENTS

We help our clients integrate, analyze, and use their data to improve their business.

150

GREAT PROJECTS

300

HAPPY CLIENTS

650

COFFEES DRUNK

1568

FACEBOOK LIKES

STRATEGY & CREATIVITY

Phasellus iaculis dolor nec urna nullam. Vivamus mattis blandit porttitor nullam.

PORTFOLIO

We pride ourselves on bringing a fresh perspective and effective marketing to each project.

Showing posts with label wireshark. Show all posts
Showing posts with label wireshark. Show all posts
  • Wireshark Capture Network Traffic







    We've gone over the basic theory -- now let's put it into practice! In this task we're going to look at some captured network traffic to see the advantages of understanding the OSI and TCP/IP Models. Wireshark Capture Network  Traffic

    Wireshark is a tool used to capture and analyse packets of data going across a network.


    We're going to use Wireshark to get an idea of what these models look like in practice, with real world data.


    Download the attached .pcap file (Wireshark capture) and follow along!


    Click Here :- PCAP FIle 







    When you first load the packet into Wireshark you're given a list of captured data in the top window (there are two items in this window just now), and in the bottom two windows you're shown the data contained in each captured packet of data:






    Currently we're looking at the first packet, so let's have a look at the data in a little more detail:





    There are 5 pieces of information here:



    Frame 1 -- this is showing details from the physical layer of the OSI model (Network Interface layer of the TCP/IP model): the size of the packet received in terms of bytes)


    Ethernet II -- this is showing details from the Data Link layer of the OSI model (Network Interface layer of the TCP/IP model): the transmission medium (in this case an Ethernet cable), as well as the source and destination MAC addresses of the request.



    Internet Protocol Version 4 -- this is showing details from the Network layer of the OSI model (Internet Layer of the TCP/IP model): the source and destination IP addresses of the request.


    Transmission Control Protocol -- this is showing details from the Transport layer of the OSI and TCP/IP models: in this case it's telling us that the protocol was TCP, along with a few other things that we're not covering here.


    Hypertext Transfer Protocol -- this is showing details from the Application layer of the OSI and TCP/IP models: specifically, this is a HTTP GET request, which is requesting a web page from a remote server.


    This is not a Wireshark room, so we're not going to go into any more depth than that. The important thing is that you understand how the theory you learnt earlier translated into a real life scenario.


    With that in mind, click on the second captured packet (in the top window) and answer the following questions:



    #1 What is the protocol specified in the section of the request that's linked to the Application layer of the OSI and TCP/IP Models?

    Ans :- Domain name system



    #2 Which layer of the OSI model does the section that shows the IP address "172.16.16.77" link to (Name of the layer)?

    Ans :- Network



    #3 In the section of the request that links to the Transport layer of the OSI and TCP/IP models, which protocol is specified?

    Ans :- User Datagram Protocol



    #4 Over what medium has this request been made (linked to the Data Link layer of the OSI model)?

    Ans :- Etnernet II



    #5 Which layer of the OSI model does the section that shows the number of bytes transferred (81) link to?

    Ans :- Physical



    #6 [Research] Can you figure out what kind of address is shown in the layer linked to the Data Link layer of the OSI model?

    Ans :- MAC



    I hope you liked this post, then you should not forget to share this post at all.
    Thank you so much :-)


  • WHAT WE DO

    We've been developing corporate tailored services for clients for 30 years.

    CONTACT US

    For enquiries you can contact us in several different ways. Contact details are below.

    Hacking Truth.in

    • Street :Road Street 00
    • Person :Person
    • Phone :+045 123 755 755
    • Country :POLAND
    • Email :contact@heaven.com

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation.