SlideShare ist ein Scribd-Unternehmen logo
1 von 17
 Tracert/Traceroute
 Ipconfig/ipconfig/ip
 arp, ping ,arping , and pathping
 nslookup/dig
 Hostname
 Route
 Nbtstat and netstat/ss
 Third-party Tools
 Packet sniffer
 Port scanners
 Throughput testers
 Looking glass sites
Commands
 Traces all of the routers between two points
 Assist in diagnosing where a problem lies
 For problems in reaching a remote system
 If traceroute stops at a certain router
Problems is the next router or the connection
 Some routers block ICMP packets containing
traceroute information
Commands
 Displays IP settings
 ipconfig without parameters
 Provides basic information only
 ipconfig/all
 Gives detailed information
 (e.g. DNS servers and MAC addresses)
 The arp table records IP address-MAC address pairs
 The arp command enables viewing and changing the
ARP table on computer
 Queries by name or IP address
 Uses ICMP packets
 Works across routers
 Problem: devices can block ICMP
 Defaults to IPv4
 Both diagnose DNS problems
 Nslookup(All operating systems)
 dig(UNIX/Linux)
 Provides more verbose output by default than nslookup
 Simplest of all utilities covered here
 Returns name of host from which it runs
 Used to display and edit the local system’s routing
table
 Also called protocol analyzer or packet analyzer
 Intercepts and logs network packets
 Many choices
 Software or dedicated hardware devices
 Software example- Wireshark
 Wireshark is a network protocol analyzer, or an
application that captures packets from a network
connection, such as from your computer to your home
office or the internet. Packet is the name given to a
discrete unit of data in a typical Ethernet network.
 Wireshark is the most often-used packet sniffer in the
world. Like any other packet sniffer, Wireshark does
three things:
 Packet Capture: Wireshark listens to a network
connection in real time and then grabs entire streams
of traffic – quite possibly tens of thousands of packets
at a time.
 Filtering: Wireshark is capable of slicing and dicing
all of this random live data using filters. By applying a
filter, you can obtain just the information you need to
see.
 Visualization: Wireshark, like any good packet
sniffer, allows you to dive right into the very middle of
a network packet. It also allows you to visualize entire
conversations and network streams.
 Probe ports on another system
 Log the state of scanned ports
 Uses
 Find unintentionally open ports that could make a
system vulnerable to attack
 Hackers can use to break into systems
 Nmap is available for UNIX and WINDOWS
 Measure the data flow in a network
 The appropriate tool depends on the type of network
throughput you want to test
 Several speed-test sites are available for checking an
internet connection’s throughput
SOFTWARE TOOLS(Bhavik).pptx

Weitere ähnliche Inhalte

Ähnlich wie SOFTWARE TOOLS(Bhavik).pptx

For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and la
ShainaBoling829
 
Lab Exercise #4 IPv4 Dr. Anne Kohnke 1 Obj.docx
Lab Exercise #4 IPv4   Dr. Anne Kohnke  1  Obj.docxLab Exercise #4 IPv4   Dr. Anne Kohnke  1  Obj.docx
Lab Exercise #4 IPv4 Dr. Anne Kohnke 1 Obj.docx
smile790243
 

Ähnlich wie SOFTWARE TOOLS(Bhavik).pptx (20)

Basic Introduction to Technology (networking).pdf
Basic Introduction to Technology (networking).pdfBasic Introduction to Technology (networking).pdf
Basic Introduction to Technology (networking).pdf
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Linux Basic Networking Command
Linux Basic Networking CommandLinux Basic Networking Command
Linux Basic Networking Command
 
OSTU - Chris Sanders on Wireshark
OSTU - Chris Sanders on WiresharkOSTU - Chris Sanders on Wireshark
OSTU - Chris Sanders on Wireshark
 
footscan.PPT
footscan.PPTfootscan.PPT
footscan.PPT
 
For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and la
 
Packet capturing
Packet capturingPacket capturing
Packet capturing
 
Commands.pptx
Commands.pptxCommands.pptx
Commands.pptx
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
Commands used in Assessing Network layout & Security
Commands used in Assessing Network layout & SecurityCommands used in Assessing Network layout & Security
Commands used in Assessing Network layout & Security
 
Network monotoring
Network monotoringNetwork monotoring
Network monotoring
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Nmap & Network sniffing
Nmap & Network sniffingNmap & Network sniffing
Nmap & Network sniffing
 
Wiretapping
WiretappingWiretapping
Wiretapping
 
6 networking
6 networking6 networking
6 networking
 
CCNA FUNDAMENTAL
CCNA FUNDAMENTALCCNA FUNDAMENTAL
CCNA FUNDAMENTAL
 
Contents namp
Contents nampContents namp
Contents namp
 
Contents namp
Contents nampContents namp
Contents namp
 
Mod5
Mod5Mod5
Mod5
 
Lab Exercise #4 IPv4 Dr. Anne Kohnke 1 Obj.docx
Lab Exercise #4 IPv4   Dr. Anne Kohnke  1  Obj.docxLab Exercise #4 IPv4   Dr. Anne Kohnke  1  Obj.docx
Lab Exercise #4 IPv4 Dr. Anne Kohnke 1 Obj.docx
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Kürzlich hochgeladen (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 

SOFTWARE TOOLS(Bhavik).pptx

  • 1.
  • 2.  Tracert/Traceroute  Ipconfig/ipconfig/ip  arp, ping ,arping , and pathping  nslookup/dig  Hostname  Route  Nbtstat and netstat/ss
  • 3.  Third-party Tools  Packet sniffer  Port scanners  Throughput testers  Looking glass sites
  • 4. Commands  Traces all of the routers between two points  Assist in diagnosing where a problem lies  For problems in reaching a remote system  If traceroute stops at a certain router Problems is the next router or the connection  Some routers block ICMP packets containing traceroute information
  • 5. Commands  Displays IP settings  ipconfig without parameters  Provides basic information only  ipconfig/all  Gives detailed information  (e.g. DNS servers and MAC addresses)
  • 6.  The arp table records IP address-MAC address pairs  The arp command enables viewing and changing the ARP table on computer
  • 7.  Queries by name or IP address  Uses ICMP packets  Works across routers  Problem: devices can block ICMP  Defaults to IPv4
  • 8.  Both diagnose DNS problems  Nslookup(All operating systems)  dig(UNIX/Linux)  Provides more verbose output by default than nslookup
  • 9.  Simplest of all utilities covered here  Returns name of host from which it runs
  • 10.  Used to display and edit the local system’s routing table
  • 11.  Also called protocol analyzer or packet analyzer  Intercepts and logs network packets  Many choices  Software or dedicated hardware devices  Software example- Wireshark
  • 12.  Wireshark is a network protocol analyzer, or an application that captures packets from a network connection, such as from your computer to your home office or the internet. Packet is the name given to a discrete unit of data in a typical Ethernet network.  Wireshark is the most often-used packet sniffer in the world. Like any other packet sniffer, Wireshark does three things:
  • 13.  Packet Capture: Wireshark listens to a network connection in real time and then grabs entire streams of traffic – quite possibly tens of thousands of packets at a time.  Filtering: Wireshark is capable of slicing and dicing all of this random live data using filters. By applying a filter, you can obtain just the information you need to see.  Visualization: Wireshark, like any good packet sniffer, allows you to dive right into the very middle of a network packet. It also allows you to visualize entire conversations and network streams.
  • 14.
  • 15.  Probe ports on another system  Log the state of scanned ports  Uses  Find unintentionally open ports that could make a system vulnerable to attack  Hackers can use to break into systems  Nmap is available for UNIX and WINDOWS
  • 16.  Measure the data flow in a network  The appropriate tool depends on the type of network throughput you want to test  Several speed-test sites are available for checking an internet connection’s throughput