answersLogoWhite

0

AllQ&AStudy Guides
Best answer

Tcpdump as is powerful tool that allows us to sniff network packets and make sure some statistical analysis out of those dumps. One major drawback to tcpdump is the size of the flat file containing the text output. But tcpdump allows us to precisely see all the traffic and enables us to create statistical monitoring scripts.

This answer is:
Related answers

Tcpdump as is powerful tool that allows us to sniff network packets and make sure some statistical analysis out of those dumps. One major drawback to tcpdump is the size of the flat file containing the text output. But tcpdump allows us to precisely see all the traffic and enables us to create statistical monitoring scripts.

View page

A protocol analyzer or packet analyzer is a hardware or software tool used to intercept digital communications occurring over a portion of a network.

Examples of packet analyzers (hardware and software) products are:

Wireshark (Ethereal)

tcpdump

Netscout

snoop

View page

Taken from wireshark's website :

"Wireshark supports a variety of capture file formats.

Some of these formats are well-documented and therefore well-known, like the libpcap / WinPcap format Wireshark uses natively.

Other formats are added to Wireshark by reverse engineering, so the support of these formats is done through "sophisticated guesswork". This is the reason why support of these file types might be incomplete and inaccurate at some parts.

  • /libpcap captures (TcpDump, Wireshark native and various other tools that use LibPcap)

  • snoop and atmsnoop captures

  • Shomiti/Finisar Surveyor captures
  • Novell LANalyzer captures
  • Microsoft Network Monitor captures
  • AIX's iptrace captures
  • Cinco Networks NetXRay captures
  • Network Associates Windows-based Sniffer captures
  • Network General/Network Associates DOS-based Sniffer (compressed or uncompressed) captures
  • AG Group/ WildPackets EtherPeek/TokenPeek/AiroPeek/EtherHelp/PacketGrabber captures

  • RADCOM's WAN/LAN analyzer captures
  • Network Instruments Observer version 9 captures
  • Lucent/Ascend router debug output
  • RedBack SE400/800 tcpdump pcap format

  • HP-UX's nettl captures

  • Toshiba's ISDN routers dump output
  • the output from i4btrace from the ISDN4BSD project
  • traces from the EyeSDN USB S0.
  • the output in IPLog format from the Cisco Secure Intrusion Detection System
  • pppd logs (pppdump format)
  • the output from VMS's TCPIPtrace/TCPtrace/UCX$TRACE utilities
  • the text output from the DBS Etherwatch VMS utility
  • Visual Networks' Visual UpTime traffic capture

  • the output from CoSine L2 debug

  • the output from Accellent's 5Views LAN agents
  • Endace Measurement Systems' ERF format captures
  • Linux Bluez Bluetooth stack hcidump -w traces
  • Tektronix K12/K15 captures

  • ASCII trace output from the IBM iSeries (AS/400) Ethernet Communications Trace
  • DCT2000 .out files

  • The output from the Juniper NetScreen snoop command

  • TamoSoft's CommView files"

View page

From my experience, network security analysts should have the following character traits:

Honesty

Curiosity

Trustworthiness

Persistence - not easily discouraged

Humility, i.e. willingness to admit ignorance coupled with a commitment to find the answer

Discretion

In addition, a network security analyst should also have the following Non-character traits:

Intelligence

Extensive knowledge of computer security, especially the applicable laws, policies and procedures that apply to the network they are working with

Skill on methods for securing computers and computer networks

Skill in using network analysis tools such as Nessus, Snort, Netcat, Metasploit, Kismet, or tcpdump. There are lot of them, but a good analyst is skilled with enough of them to do his or her job well.

Understanding of the operating systems and applications in use on the network

Skill in database security if a DB is present on the system.

Skill in router and switch administration and security.

Skill in Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs)

Resources to identify people who have any skills that they lack - for example, if they don't have sufficient skills on routers and switches, they should be able to identify someone with those skills to team up with.

View page

Step involves

1). Buy antivirus online & install

2). Use a firewall

3). Befriend strong passwords

4). Update your security software for internet security & computer safety.

5). Be cautious of clicking links in email or instant messages

6). In fact, be wary of clicking links, in any space

7). Bookmark important sites.

Stay secure with the updated version of antivirus software online from renowned brands like K7 antivirus software.

View page
Featured study guide
📓
See all Study Guides
✍️
Create a Study Guide
Search results