Author: Shubham Saini

How To Filter And Inspect Packets In Wireshark?

Reading Time: 2 minutes Here in this blog we will see how to apply Filters and inspect packets. So to apply Filters in Wireshark, we have two ways: In the Display Filter window, at the top of the screen By highlighting a packet and right-clicking on the packet Wireshark filters use key phrases as follows: ip.addr Specifies an IPv4 address ipv6.addr Specifies an IPv6 address src Source- where the Continue Reading

How To Read Color Coding In Wireshark?

Reading Time: 3 minutes In my previous blog, I explained Wireshark, Its installation, and how to use it. Now we’ll go a bit more deep into Wireshark and see how to read the captured packets. So Wireshark tries to help you identify packet types by applying common-sense color coding. Color in Wireshark Packet Type Light purple TCP Light blue UDP Black Packets with errors Light green HTTP traffic Light yellow Continue Reading

What Is Wireshark? How It Is Used And Its Installation?

Reading Time: 2 minutes Wireshark is a network protocol analyzer or an application that captures packets from a network connection, such as from your computer to your home office or the internet. The packet is the name given to a discrete unit of data in a typical Ethernet network. We’ll see the installation of Wireshark and also how to use Wireshark. Wireshark is the most often-used packet sniffer in Continue Reading

Why Are Cyberattacks So Famous?

Reading Time: 3 minutes A cyberattack is a malicious and planned attempt by an individual or organization to breach the information system. The victims of these cyber attacks are some individuals or organizations. Usually, the attacker seeks some type of benefit from disrupting the victim’s network. Understanding the types of attack, and the stages involved will help you to better defend yourself. Now, the attacks are of two types. Continue Reading

Secure Hash Algorithm (SHA): Its Importance and Mechanism

Reading Time: 3 minutes Do you want to know about how the online communication is made secure. So we have a lot of algorithms for the same and Secure Hash Algorithm (SHA) is one of those. So lets dig deep into that! While talking about information security, you might have come across a word called cryptography & which means the change in the real message that is hard to Continue Reading

black and gray laptop computer

Why Is There a Need For Authentication and Authorization?

Reading Time: 2 minutes So let’s talk about authentication & authorization. Authentication confirms that users are who they say they are. Authorization gives those users permission to access a resource. These two terms might sound similar but they have different meanings & purposes. Authentication The act of validating that users are who they claim to be is what we can call authentication. This technology provides access control for systems Continue Reading

Cryptography And Encryption Are Need Of The Hour

Reading Time: 2 minutes Nowaday’s every lock has its key. The locks may be physical or digital. And when it comes to digital locks then we talk about the security of online content. That is why Cryptography came into existence. In historic times, a scribe used unexpected hieroglyphic characters instead of the usual ones. And this leads to safe & secure communication between people. Now there are two terms we can come across. The first is cryptography & Continue Reading