<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>packet analysis &#8211; About Things | A Hans Scharler Blog</title>
	<atom:link href="https://nothans.com/tag/packet-analysis/feed" rel="self" type="application/rss+xml" />
	<link>https://nothans.com</link>
	<description>Life, Comedy, Games, Tech, Marketing, and Community</description>
	<lastBuildDate>Thu, 11 Aug 2022 21:59:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://i0.wp.com/nothans.com/wp-content/uploads/2023/02/cropped-settings.png?fit=32%2C32&#038;ssl=1</url>
	<title>packet analysis &#8211; About Things | A Hans Scharler Blog</title>
	<link>https://nothans.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">114568856</site>	<item>
		<title>Wireshark 1.2.0 &#8211; New Version</title>
		<link>https://nothans.com/wireshark-120-new-version</link>
					<comments>https://nothans.com/wireshark-120-new-version#respond</comments>
		
		<dc:creator><![CDATA[Hans Scharler]]></dc:creator>
		<pubDate>Tue, 30 Jun 2009 02:32:00 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[packet analysis]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[VoIP]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[wireshark]]></category>
		<guid isPermaLink="false">http://nothans.com/wireshark-120-new-version</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[
<p><a rel="noopener noreferrer" href="http://www.wireshark.org/" target="_blank">Wireshark</a> is a tool that performs packet and protocol analysis on a network. Packets are the virtual transport mechanism that moves data from sender to receiver. Each packet has a header and payload &#8211; the header contains information about where the packet came from and where it’s going, as well as the protocols being used. The payload has our actual digitized data &#8211; parts of a website, text, a section of a photo, or a clip of audio from an MP3 or a phone call. If you don’t get all of the packets then a phone call may sound choppy or it may take a while to download a complete file. Wireshark allows you to take a look at the packets you are sending and receiving and learn a lot more about what is happening and what’s breaking down. Wireshark is not for the lighthearted, as the tool requires knowledge of protocols and a deep understanding of OSI, IP, and TCP/UDP at the very least. But, with time, Wireshark becomes invaluable to the troubleshooting process. I have relied on the tool for my work supporting Voice-over-IP (VoIP) and system and application connectivity. The only side-effect of Wireshark is that you will soon realize why it’s not a good idea to surf the web in a public spot (without a VPN or encryption).</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img data-recalc-dims="1" fetchpriority="high" decoding="async" width="750" height="500" data-attachment-id="3074" data-permalink="https://nothans.com/wireshark-120-new-version/wireshark-start" data-orig-file="https://i0.wp.com/nothans.com/wp-content/uploads/2022/08/wireshark-start.png?fit=987%2C658&amp;ssl=1" data-orig-size="987,658" data-comments-opened="0" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="wireshark start page" data-image-description="" data-image-caption="" data-medium-file="https://i0.wp.com/nothans.com/wp-content/uploads/2022/08/wireshark-start.png?fit=300%2C200&amp;ssl=1" data-large-file="https://i0.wp.com/nothans.com/wp-content/uploads/2022/08/wireshark-start.png?fit=750%2C500&amp;ssl=1" src="https://i0.wp.com/nothans.com/wp-content/uploads/2022/08/wireshark-start.png?resize=750%2C500&#038;ssl=1" alt="" class="wp-image-3074" srcset="https://i0.wp.com/nothans.com/wp-content/uploads/2022/08/wireshark-start.png?w=987&amp;ssl=1 987w, https://i0.wp.com/nothans.com/wp-content/uploads/2022/08/wireshark-start.png?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/nothans.com/wp-content/uploads/2022/08/wireshark-start.png?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/nothans.com/wp-content/uploads/2022/08/wireshark-start.png?resize=750%2C500&amp;ssl=1 750w, https://i0.wp.com/nothans.com/wp-content/uploads/2022/08/wireshark-start.png?resize=420%2C280&amp;ssl=1 420w" sizes="(max-width: 750px) 100vw, 750px" /><figcaption>Wireshark Start Page</figcaption></figure>
</div>


<p>The <a rel="noreferrer noopener" href="http://www.wireshark.org/docs/relnotes/wireshark-1.2.0.html" target="_blank">new version</a> of Wireshark includes more protocols that it will decode, supports 64-bit Windows, and has GeoIP integrated support. Also, Wireshark works perfectly with my <a rel="noreferrer noopener" href="http://www.iamshadowlord.com/2007/05/passive-packet-capturing.html" target="_blank">passive network cable</a>. Visit <a rel="noreferrer noopener" href="http://www.wireshark.org/" target="_blank">www.wireshark.org </a>to download the latest version and learn more about it.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://nothans.com/wireshark-120-new-version/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">694</post-id>	</item>
		<item>
		<title>Passive Packet Capturing</title>
		<link>https://nothans.com/passive-packet-capturing</link>
					<comments>https://nothans.com/passive-packet-capturing#respond</comments>
		
		<dc:creator><![CDATA[Hans Scharler]]></dc:creator>
		<pubDate>Tue, 29 May 2007 18:11:00 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[packet analysis]]></category>
		<category><![CDATA[recieve-only]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[sniffing]]></category>
		<category><![CDATA[wireshark]]></category>
		<guid isPermaLink="false">http://nothans.com/passive-packet-capturing</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[
<p><em>User A</em> to <em>User B</em> packet data traffic can be monitored through a HUB by <em>User C</em> using a “receive‑only” Ethernet cable.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img data-recalc-dims="1" decoding="async" width="295" height="320" data-attachment-id="3071" data-permalink="https://nothans.com/passive-packet-capturing/cable_diagram" data-orig-file="https://i0.wp.com/nothans.com/wp-content/uploads/2022/08/cable_diagram.jpg?fit=295%2C320&amp;ssl=1" data-orig-size="295,320" data-comments-opened="0" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="cable_diagram" data-image-description="" data-image-caption="" data-medium-file="https://i0.wp.com/nothans.com/wp-content/uploads/2022/08/cable_diagram.jpg?fit=277%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/nothans.com/wp-content/uploads/2022/08/cable_diagram.jpg?fit=295%2C320&amp;ssl=1" src="https://i0.wp.com/nothans.com/wp-content/uploads/2022/08/cable_diagram.jpg?resize=295%2C320&#038;ssl=1" alt="" class="wp-image-3071" srcset="https://i0.wp.com/nothans.com/wp-content/uploads/2022/08/cable_diagram.jpg?w=295&amp;ssl=1 295w, https://i0.wp.com/nothans.com/wp-content/uploads/2022/08/cable_diagram.jpg?resize=277%2C300&amp;ssl=1 277w" sizes="(max-width: 295px) 100vw, 295px" /><figcaption>Receive Only Cable Diagram</figcaption></figure>
</div>


<p>On the HUB end of the cable, there is a loop between TX and RX to activate the HUB port. Any traffic through the HUB will now include this port in the broadcasts.</p>



<p><em>User C</em> taps onto the loop by its receive pins.</p>



<p>Once the connections are made to the HUB, <em>User C</em> will receive all packets that flow through the HUB, but <em>User C</em> will not transmit any packets towards the HUB (no DHCP requests and no ARP requests).</p>



<p>The NIC on<em> User C</em> is in promiscuous mode capturing all incoming packets only.</p>



<p>Using a receive-only Ethernet cable in this configuration allows for the ability to passively capture packets, while not actively being a part of the network.</p>



<p>Network administrators can actively test for devices in promiscuous mode, monitor for DHCP and ARP requests, and review MAC tables to determine the presence of a packet analysis tool.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://nothans.com/passive-packet-capturing/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">713</post-id>	</item>
	</channel>
</rss>
