Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan
NetworkMiner is a host-centric network analysis tool with passive sniffing capabilities. Host centric means that it sorts data with respect to the hosts rather than the packets (this is done by most active sniffing tools).
Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone who thinks it’s a good idea to try to use this to attempt to hack systems that do not belong to you
The NetworkMiner user interface is divided into tabs. Each tab provides a different angle of information of the captured data. The following are the steps to running NetworkMiner for it to analyze network traffic:
- If you are running Windows 7 or Windows 8, you will need to run NetworkMiner.exe with administrative privileges.
- Select the network interface for which the data has to be captured.
3.By default, the Hosts tab is selected. You can sort hosts by IP address, MAC address, hostname, Operating System etc.
4.Press the start button to begin the sniffing process.
Analyzing data in NetworkMiner
On the Hosts tab, you will see a list of hosts connected to the network. You can expand any host to see detailed information like its MAC address, hostname, Operating System, TTL, Open ports, packets sent, received etc. A good network admin always has an overview of what data is being transmitted to and from his network. The list of hosts will give you a better idea of what type of network traffic you are using.
If you find a suspicious host, you can always block it through your firewall. The firewall should be the one from where all network traffic passes before reaching the destinations. If you block the host on your system firewall, it will only be blocked on your system.
If you are using any other network sniffer that can save the PCAP file, NetworkMiner can also analyze the PCAP file and let you go through the data offline.
One clever feature of NetworkMiner is that it can reassemble the files transmitted through the network and then download them in complete form. This can be done from the Files tab. You can also capture and download images from the network traffic from the Images tab.
Sending passwords in clear can be highly dangerous for the network as a whole. If you want to check if any host is transmitting passwords in clear text, you can see it in the Credentials tab.
Conclusion
NetworkMiner can be highly useful for Wifi networks that are constantly open to new threats. It can audit and analyze network traffic regularly in order to block vulnerabilities and weak areas.
If you are running a network, which packet sniffing tool do you use to check your security? Does it analyze and audit? I had been using Wireshark but have fallen in love with NetworkMiner because of its simplicity and ease of use.
www.extremehacking.org
Cyber Suraksha Abhiyan, CEHv9, CHFI, ECSAv9, CAST, ENSA, CCNA, CCNA SECURITY,MCITP,RHCE,CHECKPOINT, ASA FIREWALL,VMWARE,CLOUD,ANDROID,IPHONE,NETWORKING HARDWARE,TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking,Center For Advanced Security Training in India, ceh v9 course in Pune-India, ceh certification in pune-India, ceh v9 training in Pune-India, Ethical Hacking Course in Pune-India