Network traffic analysis and sniffing using Wireshark

David Artykov
Purple Team
Published in
14 min readMay 20, 2021

--

Attackers are unendingly adjusting their strategies to avoid detection and, much of the time, leverage legitimate credentials with trusted tools already deployed in a network domain, making it hard for associations to recognize primary security dangers proactively.

By Waqar Ul Hassan

Network traffic analysis is a troublesome and requesting task that is a crucial piece of a Network Administrator’s job. Network Administrators are continually endeavoring to keep up the smooth task of their systems. If a network were to be down notwithstanding for a short time, productivity inside an organization would decline, and on account of public service departments, the capacity to give essential services would be undermined. To be proactive instead of reactive, executives need to monitor traffic movement and performance all through the network and confirm that security breaches don’t happen inside the system.

While other network security devices, for example, firewalls and IDS/IPS tools center around checking vertical traffic that crosses the edge of a network domain, network traffic analysis solutions are centered around all interchanges — regardless of whether those are conventional TCP/IP style packets, “virtual system traffic” crossing a virtual switch, traffic from and inside cloud workloads, and API calls to SaaS applications or serverless processing…

--

--