Question

Select one network scanning software tool (there is a list in your required reading slides) and...

Select one network scanning software tool (there is a list in your required reading slides) and explain in detail how it works and how detects network vulnerabilities.

Provide the site where you obtained your information and include that in your assignment write-up.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Explanation in detail on how the "Wireshark" network scanning software tool works and how it detects network vulnerabilities:
* Wireshark works by downloading, installing, and running the software on a Windows, Linux, and Mac OS x Operating Systems (OSs) computers and servers.
* It also responsible for network protocol analyzing function.
* The software tool scans data vulnerabilities on a live (production) network and environment that is between an active client and a server.
* It shows the network traffic along the way in its scanning and detection trail.
* It even lets the user or an administrator follow the network stream.
* It displays the stream construction of TCP sessions.
* It rapidly scans the network for issues, and even scans the issues themselves rapidly, letting the users or administrators know about the future influence of possible or potential network attacks.
* The tool prepares a system stands on a network and yet without losing its performance due to network attacks.
* It overcomes network issues.
* The tool helps networks from intrusions through their loopholes.
* It lets the users or administrators see what is happening on their network at a microscopic level.
* It works both, as a network monitor and a security tool.
* It runs on Windows, Linux, macOS, Solaris, FreeBSD, NetBSD, and many other OSs.
* It uses its other online tools such as Editor Modeline Generator, IPv4 and IPv6 Connectivity Test, OUI Lookup Tool, String-Matching Capture Filter Generator, and WPA PSK Generator, for scanning, analyzing, and detecting purposes.
* It uses its bug tracker utility, facility or feature to search for and identify a known vulnerability.
* Wireshark tool sniffs and analyzes your network traffic and examines the packet's detailed contents in the /etc/snort/tcpdump.log* files.
* Wireshark tool collects the traffic being sent over the network, analyzes, and troubleshoots the issues.
* Wireshark tool, thus monitors network traffic and captures the same.
* It does live "silent portscanning", to find out which ports are open, thus vulnerable for attacks.
* It provides metrics and pre-defined insights to identify and/or resolve problems in a fast manner.
* It analyzes network traffic in real-time.
* It troubleshoots issues on a given network.
* It also troubleshoots Wi-Fi networks.
* It gathers information.
* It monitors packet flow.
* It checks every data packet sent over a network.
* It inspects a network deeply monitoring it constantly trying to detect network anomalies and security threats.
* It scans for vulnerabilities for free.
* It analyzes security events and troubleshoots network security device issues.
* It is also used as a forensic tool.
* It summarizes the information about all the network devices and their associated traffic.
* It uses pcap to capture packets.
* It even sorts and filters the collected data.
* Wireshark allows users to put Network Interface Controllers (NICs) into promiscuous mode to capture all the traffic visible on the interface that also includes unicast traffic not sent to the NIC's MAC address.
* It captures low-level package data.
* It parses and displays the fields, including their meanings.
* It also filters wireless connections.

Add a comment
Know the answer?
Add Answer to:
Select one network scanning software tool (there is a list in your required reading slides) and...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Using your reading and the Internet, provide a one-page response detailing the relevance of physical security...

    Using your reading and the Internet, provide a one-page response detailing the relevance of physical security in the cybersecurity arena. Write a few short paragraphs and feel free to use bullets. Part 1: Compile Cyber Investigation Guidelines (3 points) Using your reading and the Internet, provide a response detailing the chain of custody considerations to enable you to collect evidence that will useful for a legal prosecution. Write short paragraphs guiding IT employees regarding the need to protect evidence and...

  • Overview: In this activity, you will begin to build your network list of contacts. Instructions: •...

    Overview: In this activity, you will begin to build your network list of contacts. Instructions: • First, decide on a method to organize your growing network list. You can use whatever medium that works best for you (excel spreadsheet, word document, etc.). • Build your own networking template and share it in this career lab. You may want to organize by categories (i.e. family, friends, community) and choose to include specific contact information (i.e. Email, phone, address, affiliation, etc.). •...

  • Write a plan for deploying IDS and IPS in your network for the scenario in your group project. Pl...

    Write a plan for deploying IDS and IPS in your network for the scenario in your group project. Please include a diagram of where you will place IDS and IPS in your network. come up with a plan for how IDS and IPS will be utilized in your organization. As a part of your plan, explain how you will deal with false positives

  • Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a...

    Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft. You have been informed that an employee may have been using corporate email to send confidential corporate information to one or more personal email accounts, which may or may not belong to him. You have been told that this action has been happening each business day for the last 13 days and the employee is unaware...

  • Group Writing Assignment: Becoming a Cyber Sleuth Ever since the Internet has become a global tool...

    Group Writing Assignment: Becoming a Cyber Sleuth Ever since the Internet has become a global tool for sharing information and data, countless organizations have gone virtual. They rely on ICTs to coordinate employees and customers as they produce, distribute, or provide goods or services. As the virtual world of business and personal data has expanded, so, too, has cybercrime. According to a 2011 Symantec study, hackers and cybercriminals have cost the global economy an estimated $114 billion annually. Whether from...

  • In this assignment, you will be creating a Work Breakout Structure (WBS) for your project using the software applicatio...

    In this assignment, you will be creating a Work Breakout Structure (WBS) for your project using the software application that you have selected. Prepare the WBS, and submit the file to your instructor. This assignment is due Sunday at 11:59 p.m. All assignments should be uploaded in the Assignment area. Project Software Options There are many project management software applications that are designed to help develop project plans and schedules as well as keeping track of these plans and creating...

  • Assignment 1 In this assignment you will be writing a tool to help you play the...

    Assignment 1 In this assignment you will be writing a tool to help you play the word puzzle game AlphaBear. In the game, certain letters must be used at each round or else they will turn into rocks! Therefore, we want to create a tool that you can provide with a list of letters you MUST use and a list of available letters and the program returns a list of all the words that contain required letters and only contain...

  • Determine the security updates that apply to your computer. Compile a list of security updates for your computer and provide a summary of the vulnerabilities they prevent from being exploited. Provide...

    Determine the security updates that apply to your computer. Compile a list of security updates for your computer and provide a summary of the vulnerabilities they prevent from being exploited. Provide a summary of the course of action you have taken to secure your computer. If your computer is up-to-date in terms of recommended patches and configuration changes, choose three of the optional enhancements that would apply to your operating system (OS) version and summarize why they would be beneficial....

  • Select one of the key concepts from the list below for your Discussion response based on...

    Select one of the key concepts from the list below for your Discussion response based on a company or organization of your choice: * Assess the strategic importance of the supply chain to your organization. What strategic differences occur between a product-based business (sells a physical, tangible product), and a service-based business (sells a service, which has no physical or tangible product)? * Compare the six sourcing strategies and relate your response to your selected organization. * Explain the steps...

  • This is your opportunity to be creative! You are required to create a minimum of two...

    This is your opportunity to be creative! You are required to create a minimum of two HTML pages. The first required web page is your Home Page, which is about you. The second web page describes a place to which you have traveled or would like to travel. Each of your web pages will be graded for content, creativity, and for appropriate use of the HTML statements that have been discussed in class. You must use a text editor and...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT