Solved

ethereal?

Posted on 2004-04-19
4
467 Views
Last Modified: 2010-04-11
Hi,
 I found out that ethereal would be able to capture network packets and hence allow for network monitoring. I was wondering anyone could provide some step by step help in getting it to work.
I am using XP.
Thanx.
0
Comment
Question by:QLJ
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 1

Accepted Solution

by:
Mike_helps_you earned 200 total points
ID: 10866517
Ethereal is pretty much like snort. Just install it, plug it into the same network, then mirror the IP/MAC/Port you want to hit.  

Haven't used it in awhile but that's what I remembered.
Was pretty self explanatory.  I don't know about monitoring everything on the network though.
0
 
LVL 1

Author Comment

by:QLJ
ID: 10866949
hmm... i think i realised the problem. you made it sound so easy that I had to relook what was installed. I downloaded the wrong file! *oops*
so is snort better or ethereal better???
What would you recommend to monitor the network then? especially if it is a web server and  i want to take note of the activities
0
 
LVL 1

Expert Comment

by:Mike_helps_you
ID: 10867047
If you are just beginning, just use ethereal.  It's based on snort, but of course, snort is better. It's like the security of Linux vs Unix.  Linux is based on Unix. Unix is a lot more secure.

Just take a switch and plug 2 PCs to it and mirror, sniff, etc. the port. You'll get the idea. You can also try sitescope. Good notification app.
0
 
LVL 5

Expert Comment

by:makana
ID: 10867126
Visitr this Page please to get all the answers about Etheral.

http://www.ethereal.com/faq.html

Makana
A+ MCP Cisco CCNA Acad Sem-1
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question