Essential Tools for Network Monitoring: Scanners, Analyzers, and More!



Essential Tools for Network Monitoring: Scanners, Analyzers, and More!

Essential Tools for Network Monitoring: Scanners, Analyzers, and More!

πŸ”₯πŸ”₯πŸ”₯SMASHπŸ‘Š THAT🀜 LIKEπŸ‘ BUTTONπŸ”₯πŸ”₯πŸ”₯ and don’t forgetπŸ€¦β€β™€οΈ to πŸ‘subscribeπŸ””πŸ”₯πŸ”₯πŸ”₯
https://imp.i384100.net/9WaKnY
Use above link to earn a certificate from google and Coursera.
#free #viral #network #networking #learning

🎢 Torch scanners πŸ”¦ are πŸ” used to scan a network 🌐 for open ports and protocols πŸ“‘πŸ”Œ. The information πŸ“ that a port scanner gathers is Vital Information πŸ’ͺ if you want to harden the network. πŸ›‘οΈ Port scanners are a great method of finding vulnerabilities πŸ” in the network infrastructure, allowing the network administrator to plug πŸ”Œ those vulnerabilities before they become a security breach πŸ”’. I do have to issue a word of caution ⚠️, you should only use a port scanner on a network or system that you are authorized to scan βœ…. Port scanning is a possible sign of someone trying to breach a system πŸ•΅οΈβ€β™€οΈ and can lead to problems if you’re not authorized to scan that system. You don’t want to have to try and explain to an information security specialist πŸ€¦β€β™‚οΈ why you were scanning their network if you’re not authorized to scan it. A little bit different than a port scanner are applications that use interface monitoring or packet flow monitoring 🌊. These are usually deployed as an active software tool πŸ› οΈ to Monitor and analyze Network traffic 🚦 within a network segment. They’re commonly called packet sniffers πŸ‘ƒ or protocol analyzers πŸ•΅οΈβ€β™€οΈ. They allow for an in-depth look πŸ‘€ at what traffic is on the network and may reveal security issues πŸ” that the network administrator can then mitigate πŸ›‘οΈ. They help to identify top talkers πŸ—£οΈ on a network segment, top talkers are those nodes πŸ§‘β€πŸ’» or applications πŸ“± that generate the most amount of traffic. Packet sniffers can help to identify top listeners πŸ”Š on a network segment, a top listener is that interface or the interfaces that are receiving the most Network traffic 🌊 or put another way those interfaces that are utilizing the most bandwidth for receiving packets πŸ“¦. This can help an administrator when they have determined that load balancing might be needed on the network. πŸ“ˆ Microsoft message analyzer and Wireshark are examples of free packet flow monitoring tools. πŸ’»

Now let’s move on to wireless monitoring tools πŸ“Ά and we’re going to begin with the Wi-Fi analyzer πŸ“‘. A Wi-Fi analyzer is a similar tool to a protocol analyzer but only for wireless networks πŸ“Ά. It sniffs out packets on wireless networks and gives you statistics πŸ“Š on those packets that it sees πŸ‘€. It can check for bandwidth usage, channel usage, top talkers πŸ—£οΈ, top listeners πŸ”Š, etc. just like a packet sniffer can. Wi-Fi analyzers can also identify networks πŸ“Ά by passively scanning the radio frequencies to determine where traffic is coming from. Given enough time, a Wi-Fi analyzer can also identify hidden networks πŸ•΅οΈβ€β™‚οΈ or those that you don’t know about. A Wi-Fi analyzer can also infer non-beaconing networks based on data traffic over the radio frequencies. They may not be able to discover the SSID but they can tell the network administrator that something is passing traffic there 🚦. Another type of wireless monitoring tool πŸ“‘ are wireless survey tools πŸ—ΊοΈ. They’re most commonly used as a design tool πŸ› οΈ for setting up high quality wireless networks πŸ“Ά. When used in conjunction with mapping tools πŸ—ΊοΈ, the survey tools can help to establish the required amount of access points to get the proper amount of coverage 🌍, the ideal antenna placement πŸ“‘, and the optimum amount of channel overlap πŸ“‘. Wireless survey tools can also help to identify possible sources of radial frequency interference

This video is part of a series where we bring the best videos to you, we have made some modifications to this video.

Publication Permissions: Original video was published with the Creative Commons Attribution license (reuse allowed).
Attribution Credits:
Source: https://www.youtube.com/@PaceITOnline
Join us on
Slack: https://join.slack.com/t/shrlrncom/shared_invite/zt-hllhjr28-hVYjXZ9WE8Byx4ZZS8zP8Q
Reddit: https://www.reddit.com/user/ShareLearn
Telegram: https://t.me/shrlrn
Facebook: https://www.facebook.com/shrlrn
Instagram: https://www.instagram.com/shrlrncom
Pinterest: https://www.pinterest.com/shrlrncom
Twitter: https://twitter.com/shrlrncom

This video is for information purposes only
Note: We earn a commission when you click on the link and or buy .