0% found this document useful (0 votes)
16 views5 pages

Omnya Ashraf .Network (Wireshark)

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views5 pages

Omnya Ashraf .Network (Wireshark)

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Wireshark

Presented by
Omnia Ashraf
Wireshark:
Wireshark is a popular open-source network
protocol analyzer. It allows users to capture and
examine the data traveling across a network in
real-time. By analyzing this data, you can
troubleshoot network issues, optimize performance,
and detect security vulnerabilities. Wireshark
supports a wide range of protocols and provides
detailed insights into network traffic, making it a
valuable tool for network administrators, security
professionals, and developers.
Characteristics of wireshark:

Wireshark is the most often-used packet


sniffer in the world. Like any other packet
sniffer, Wireshark does three things:
 Packet Capture: Wireshark listens to a network connection in real
time and then grabs entire streams of traffic – quite possibly tens of
thousands of packets at a time.
 Filtering: Wireshark is capable of slicing and dicing all of this
random live data using filters. By applying a filter, you can obtain just
the information you need to see.
 Visualization: Wireshark, like any good packet sniffer, allows you to
dive right into the very middle of a network packet. It also allows you
Uses of wireshark:
Wireshark is used for several purposes in network management and
analysis:

 Network Troubleshooting: It helps diagnose network problems by


capturing and analyzing packets, allowing users to identify issues like
network latency, packet loss, or misconfigurations.
 Network Performance Analysis: Users can monitor network performance
and bandwidth usage to identify bottlenecks or inefficiencies.
 Security Analysis: It aids in detecting and investigating network security
incidents, such as unauthorized access or malicious activity, by analyzing
traffic patterns and protocols.4.
 Protocol Analysis: It allows for in-depth examination of various network
protocols, which can be useful for debugging and development.
 Network Forensics: In the case of security breaches or other incidents,
Wireshark can help reconstruct events and understand the nature of the
attack *Educational Purposes*: It’s a valuable tool for learning about
Thank you

You might also like