How to install Wireshark on Windows Server and use it

Introduction

This blog will teach you how Wireshark functions. We’ll walk you through where to find and install the Wireshark application on your PC or Server. You will learn how to start a packet capture and what data you may expect to receive from it. The Wireshark lecture will also show you how to utilize the data manipulation features in the interface fully. You’ll also learn how to get data analysis tools better than Wireshark’s built-in features.

What can you do with Wireshark?

As one of the most dependable network protocol analyzers on the market in recent years, Wireshark has gained a solid reputation. This open-source program has been used as a comprehensive network analysis tool by users worldwide. Users can use Wireshark to analyze network security vulnerabilities, debug protocols, and learn about network activities.

How to Use Wireshark

Wireshark is a network protocol analysis tool, as was already described. Wireshark’s primary function is to deconstruct data packets sent across various networks. The user can look for particular data packets and filter them, then examine their passage across their network. These packets can be examined either in real-time or offline.

The user can use this data to produce statistics and graphs. Originally known as Ethereal, Wireshark has become one of the most important network analysis tools. Users who want to view data from various networks and protocols should use this tool.

Both novice and professional users can utilize Wireshark. Once you understand how to capture packets, the user interface is easy to use. Advanced users can decrypt packets using the platform’s decryption capabilities as well.

(more…)

Using fdisk to manage Partitions

Introduction

One of the most time-consuming tasks while using Linux is managing partitions. If you are unfamiliar with the operating System, you could initially find the procedure complicated.

But it’s crucial to understand how to handle partitions on your computer since disk partitioning is necessary for many processes, including installing an operating system and file organization.

Here is a tutorial on creating, resizing, and removing partitions on Linux using the Fdisk program.

What is fdisk?

Fdisk is a text-based command-line tool for Linux that allows you to inspect and manage hard disk partitions. You can use the disk space to install operating systems, back up your data, and manage your files by using it to support a variety of partition tables and create, delete, and alter disk partitions.

(more…)

How to use ifconfig in Linux

Introduction

To configure, manage, and query network interface parameters through the command-line interface or in a system configuration script, use the “interface configuration” (abbreviated as “ifconfig”) program on Unix/Linux operating systems.
The “ifconfig” command can display the current network configuration information, configure a network interface’s hardware address, IP address, netmask, or broadcast address, create an alias for the network interface, and enable or deactivate network interfaces.
The “Useful “ifconfig” Commands” and their real-world applications are covered in this article. They could be very useful to you when managing and configuring network interfaces in Linux systems.

View All Network Interface Settings

Without any parameters, the “ifconfig” program will list all the details of the current interfaces. The assigned IP address of a server can also be checked using the ifconfig command.

ifconfig

(more…)

Install and configure Snort in Linux

What is Snort?

Snort is an open-source network intrusion detection platform developed by Martin Roesch, the founder and former CTO of Sourcefire. Snort is presently developed and maintained by Cisco.

A packet sniffer called Snort keeps track of network traffic, closely inspecting each packet for a harmful payload or suspicious abnormalities. Snort, a long-standing pioneer in enterprise intrusion prevention and detection technologies, may be compiled on most Linux operating systems (OSes) or Unix. A Windows version is also available.
Network intrusion prevention system Snort is free and open source. It will monitor network traffic and compare it against a user-defined Snort rule set. This user-defined rule set will be stored in a file named  “snort.conf”. This is the most critical function that Snort can perform.

Snort applies rules to the traffic being monitored and sends out alerts when it identifies suspicious behavior on the network.

It can recognize several techniques of cyberattacks, such as operating system fingerprinting, denial of service attacks, buffer overflow attacks, common gateway interface attacks, stealth port scans, and Server Message Block probes.

(more…)

Add or edit Swap Space for Linux

Introduction

To run and store loaded applications, each processor in the machine needs a certain quantity of data storage space. Every PC is built with primary and secondary memories, from which applications may operate, and data can be stored while processing. If you work in IT or are a computer scientist, you should give storage some severe thought. In that circumstance, some software programs must be developed.

(more…)

How to troubleshoot Linux using dmesg

Introduction

The dmesg command is a Linux utility that retrieves kernel-related messages from the kernel ring buffer and displays them. The ring buffer holds information regarding hardware, device drivers’ initialization, and kernel modules’ messages that occur during system startup.
The dmesg command is crucial for diagnosing hardware-related errors, warnings, and device failure.

(more…)

How to Use strace to Monitor Linux System Calls

Introduction

A system call is a programmatic method of asking the kernel for a service, and strace is an effective tool for tracing the communication between user processes and the Linux kernel.
It would help if you first comprehended system calls to understand how an operating system functions. An operating system’s primary purpose is to give user programs abstractions.
Generally speaking, an operating system has two modes:
Kernel mode: a privileged, strong mode that the operating system kernel employs
User mode: most user programs are run

Users mostly employ command-line tools and graphical user interfaces (GUI) to do daily chores. System calls communicate with the kernel to complete tasks while operating invisibly in the background.
System calls accept and process inputs and return values in a manner that is quite similar to that of function calls. The only distinction is that function calls do not enter a kernel, while system calls do. User space is shifted to kernel space through a novel trap mechanism. (more…)

How to Use the ps Command to Monitor Linux Processes

Introduction

There will be a time when you need to learn more about a specific process frequently to get its ID so you can parse the “kill” command. Of course, it is not necessary to be for that. This manual will cover the ‘ps’ and ‘top’ commands each must be present in a typical Linux installation.

What is ps?

An application called “ps,” which stands for “process state,” may read all of the process data on your computer, display the results on the terminal, and then shut down. The running status, user and group it belongs to, the process ID, and whether it was started from a terminal are all examples of information that can be provided.

It can also list only a few or all of the processes. It takes both standard style parameters (with a dash, such as “-e”) and BSD style arguments (without a dash), as well as GNU style syntax (those preceded by two dashes). To learn more, refer to the man page.

(more…)

How to Monitor CPU Temperature for Windows and Linux

Introduction

Monitor the CPU temperature of your Windows or Linux computer to keep it running smoothly. You can help with this by using contemporary CPU temperature monitoring software.

Why do you require it?

The fact is, every PC produces heat. It can only withstand so much heat before the hardware starts to malfunction. The PC has numerous components, including a motherboard, hard drive, and more, and while operating, it generates heat. Before a threshold, the heat is normal, but it might seriously harm the CPU if it isn’t controlled.

So, if the temperature rises unusually, you can face a sudden system shutdown. While working, you or the other employees can notice a slowdown in their performance. In the worst instance, heat could harm the CPU’s motherboard, essential chips, or other components.

You must use a CPU temperature monitoring program to monitor your computer CPU to prevent all of these and safeguard your system and its performance.

(more…)

Top 9 Monitoring tools on Linux

Introduction

Every computer system can benefit from effective management and monitoring. Keeping an eye on the performance of your system will allow you to identify and handle any issues that may arise immediately.

For this reason, numerous command-line utilities have been developed. This article will expose you to the most useful applications in your toolkit.

Prerequisites

You’ll need access to a Linux-based operating system PC to follow along with this article. This might be either a virtual private server to which you have connected through SSH or your local computer. Note that this article was confirmed on a Linux server running Ubuntu 20.04, but the examples should work on any machine running any version of the Linux operating system.

(more…)