SlideShare a Scribd company logo
NETWORK PROTOCOL ANALYSERCC-13         ALIREZA KHAKPOUR     -1MS07IS122         MOHAMMAD ASKARI     -1MS04IS096         SHAHAB SADEGHI         -1MS05IS094         HAMIDREZA HABIBI       -1MS07IS126
INTRODUCTIONA packet sniffer is referred to as a network monitor or      network analyzer
Using the information captured by the packet sniffer an administrator can identify wrong packets and use the data to specify delay and help maintain efficient network data transmission.
it captures all of the packets of data that pass through a given network interface.If placed into promiscuous mode, the packet sniffer is capable of capturing ALL packets traversing the network regardless.
By placing a packet sniffer on a network in promiscuous mode, we can capture and analyze all of the network traffic.
A packet sniffer can only capture packet information within a given subnet. the packet sniffer needs to be running on a computer that is inside the corporate network as well.
Detecting rogue packet sniffers on your network is not an easy task. Its very nature the packet sniffer is passive.
There are ways to identify network interfaces on your network that are running in promiscuous mode.
Network Protocol Analyzer
Network Protocol Analyzer
Network Protocol Analyzer
Network Protocol Analyzer
Network Protocol Analyzer
Network Protocol Analyzer
Network Protocol Analyzer
Network Protocol Analyzer
Network Protocol Analyzer
Network Protocol Analyzer
Network Protocol Analyzer
Network Protocol Analyzer
Network Protocol Analyzer
Network Protocol Analyzer
Network Protocol Analyzer
Network Protocol Analyzer

More Related Content

PPTX
Network Protocol Analyzer
PPTX
Ntwrk monitoring capsa
PPT
Network Protocol Analyzer
PPTX
Packet sniffers
PPT
Packet Sniffing
PPTX
Packet sniffing in LAN
PPTX
Packet sniffers
PPTX
Packet sniffing in switched LANs
Network Protocol Analyzer
Ntwrk monitoring capsa
Network Protocol Analyzer
Packet sniffers
Packet Sniffing
Packet sniffing in LAN
Packet sniffers
Packet sniffing in switched LANs

What's hot (20)

PPTX
Packet capturing
PPTX
Ethical Hacking - sniffing
PPTX
Packet sniffing
PDF
Packet sniffing & ARP Poisoning
PPTX
Nmap & Network sniffing
PPTX
Prensentation on packet sniffer and injection tool
PPTX
Packet capture in network security
PPTX
Network sniffers & injection tools
DOCX
Packet sniffer repot
PPT
Hacking Cisco
PDF
Sniffing via dsniff
PPTX
Password sniffing
PDF
Packet Sniffing
PPTX
PACKET Sniffer IMPLEMENTATION
PPTX
Router forensics
PPTX
Network packet analysis -capture and Analysis
PDF
Wireshark Traffic Analysis
PPTX
Wireshark
PPTX
Packet analysis using wireshark
PPTX
Wireshark network analysing software
Packet capturing
Ethical Hacking - sniffing
Packet sniffing
Packet sniffing & ARP Poisoning
Nmap & Network sniffing
Prensentation on packet sniffer and injection tool
Packet capture in network security
Network sniffers & injection tools
Packet sniffer repot
Hacking Cisco
Sniffing via dsniff
Password sniffing
Packet Sniffing
PACKET Sniffer IMPLEMENTATION
Router forensics
Network packet analysis -capture and Analysis
Wireshark Traffic Analysis
Wireshark
Packet analysis using wireshark
Wireshark network analysing software
Ad

Viewers also liked (20)

PPTX
Vector Network Analyser for Microwave Measurement
PPT
Network analysis
PPT
2 multiplexing
PDF
Network+
PDF
آموزش C
DOCX
nov. cv for work
PDF
Monitoring and Managing Network Application Performance
PPT
Design Con VNA
PPTX
Net+, 6th Ed. CH. 1
PDF
Orthogonal Frequency Division Multiplexing (OFDM)
PDF
CompTIA Network+ Objectives
PPT
Signal Integrity Testing With a Vector Network Analyzer
PDF
MCITP
PPTX
Wdm and dwdm ppt
PPT
Wireshark - presentation
PPTX
Network analysis & cpm
PPTX
Network Analysis
PPT
WDM Basics
PDF
WDM principles
PPTX
Project Management PERT and CPM
Vector Network Analyser for Microwave Measurement
Network analysis
2 multiplexing
Network+
آموزش C
nov. cv for work
Monitoring and Managing Network Application Performance
Design Con VNA
Net+, 6th Ed. CH. 1
Orthogonal Frequency Division Multiplexing (OFDM)
CompTIA Network+ Objectives
Signal Integrity Testing With a Vector Network Analyzer
MCITP
Wdm and dwdm ppt
Wireshark - presentation
Network analysis & cpm
Network Analysis
WDM Basics
WDM principles
Project Management PERT and CPM
Ad

Similar to Network Protocol Analyzer (20)

PDF
An Approach to Detect Packets Using Packet Sniffing
DOC
A wireless intrusion detection system and a new attack model (synopsis)
PDF
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARK
PPT
Network monotoring
DOCX
Experiment 7 traffic analysis
PDF
Java Abs Packet Sniffer Tool
DOCX
Packet Tracer: SNMP, Netflow, Sys-log
PDF
04-post-connection-attacks.pdf
PDF
Creating an Effective Network Sniffer
DOCX
For your final step, you will synthesize the previous steps and la
DOCX
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
DOC
Network border patrol preventing c ongestion collapse(synopsis)
PPT
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
PPT
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
hakin9_6-2006_str22-33_snort_EN
PDF
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
PDF
Network Monitoring with Wireshark
DOCX
Packet sniffer repot
An Approach to Detect Packets Using Packet Sniffing
A wireless intrusion detection system and a new attack model (synopsis)
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARK
Network monotoring
Experiment 7 traffic analysis
Java Abs Packet Sniffer Tool
Packet Tracer: SNMP, Netflow, Sys-log
04-post-connection-attacks.pdf
Creating an Effective Network Sniffer
For your final step, you will synthesize the previous steps and la
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
Network border patrol preventing c ongestion collapse(synopsis)
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
International Journal of Engineering Research and Development (IJERD)
hakin9_6-2006_str22-33_snort_EN
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
Network Monitoring with Wireshark
Packet sniffer repot

More from Sourav Roy (13)

PPTX
Tcpdump
PPT
Proxy Servers
PPT
Proxy Servers
PPT
By Nithin & group
PPT
Remote Login- Noesis
PPT
Ssh And Rlogin
PPT
Project Sparsh
PPT
Remote Login
PPTX
Http Proxy Server
PDF
Introduction To H1N1
PPTX
Anabhra Ratri Ki Anupama
PPTX
Wireshark
PPT
Transmission Media
Tcpdump
Proxy Servers
Proxy Servers
By Nithin & group
Remote Login- Noesis
Ssh And Rlogin
Project Sparsh
Remote Login
Http Proxy Server
Introduction To H1N1
Anabhra Ratri Ki Anupama
Wireshark
Transmission Media

Recently uploaded (20)

PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
RMMM.pdf make it easy to upload and study
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Trump Administration's workforce development strategy
PDF
Complications of Minimal Access Surgery at WLH
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Classroom Observation Tools for Teachers
PDF
IGGE1 Understanding the Self1234567891011
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PDF
Computing-Curriculum for Schools in Ghana
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
advance database management system book.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PPTX
Introduction to Building Materials
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
RMMM.pdf make it easy to upload and study
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Trump Administration's workforce development strategy
Complications of Minimal Access Surgery at WLH
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Classroom Observation Tools for Teachers
IGGE1 Understanding the Self1234567891011
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
Computing-Curriculum for Schools in Ghana
Supply Chain Operations Speaking Notes -ICLT Program
advance database management system book.pdf
Final Presentation General Medicine 03-08-2024.pptx
Unit 4 Skeletal System.ppt.pptxopresentatiom
Introduction to Building Materials
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Chinmaya Tiranga quiz Grand Finale.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc

Network Protocol Analyzer