Also, be aware that the software mentioned will be run form the command-line. Methodologyįor you to get the most out of this article, it is assumed you have a running wired (ethernet) network, as well as some basic knowledge of Linux, and/or a computer with a Linux operating system installed, and some basic network knowledge. By so doing, you can determine what you want to use, in both programs and their features. This article is intended to point you to a similar direction: introducing and providing the basics of each piece of software, some commonly used settings and examples, and links to additional information. I learned the basics of the program, then learned to use tools and features that I needed. After all that time and experience, I still am along way from knowing everything the program is capable of doing. I have used Adobe Photoshop both personally and professionally for at least 15 years. If I did, this piece would look as if it been written by (though surely not as eloquently) Tolstoy. That being said, it is therefore way beyond the scope of this article to drill down deep into the minutiae of each piece of software. The output from the network monitoring tools introduced here has a great potential to be very overwhelming to all but well trained IT professionals, and sadly, seasoned hackers. This topic can very quickly get incredibly complex. Provide a list of all active devices on the network, and a drill-down by device, showing its IP address, Mac address, open ports and their port numbers, etc. Knowing what and where vulnerabilities exist in your network becomes the very first step in determining what to do to remove or at least reduce security issues. In many instances, you will be in effect “hacking” your own network, using some of the same tools hackers use to do the very same thing.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |