Go Back   AnandTech Forums > Software > Security

Forums
· Hardware and Technology
· CPUs and Overclocking
· Motherboards
· Video Cards and Graphics
· Memory and Storage
· Power Supplies
· Cases & Cooling
· SFF, Notebooks, Pre-Built/Barebones PCs
· Networking
· Peripherals
· General Hardware
· Highly Technical
· Computer Help
· Home Theater PCs
· Consumer Electronics
· Digital and Video Cameras
· Mobile Devices & Gadgets
· Audio/Video & Home Theater
· Software
· Software for Windows
· All Things Apple
· *nix Software
· Operating Systems
· Programming
· PC Gaming
· Console Gaming
· Distributed Computing
· Security
· Social
· Off Topic
· Politics and News
· Discussion Club
· Love and Relationships
· The Garage
· Health and Fitness
· Merchandise and Shopping
· For Sale/Trade
· Hot Deals with Free Stuff/Contests
· Black Friday 2013
· Forum Issues
· Technical Forum Issues
· Personal Forum Issues
· Suggestion Box
· Moderator Resources
· Moderator Discussions
   

Reply
 
Thread Tools
Old 02-15-2010, 09:29 AM   #1
importdistributors
Senior Member
 
importdistributors's Avatar
 
Join Date: Sep 2004
Posts: 294
Smile Secure Vs. Unsecure (WireShark)

Hello All,

I have to write a paper about internet security. Specifically, we are supposed to determine using a packet sniffer, what is secure and what is not. For example we are to run wireshark, and surf the internet then we are supposed to state what shows up in the wireshark logs and what doesnt.

When logging into an HTTPS, does the username and password get captured?

How about chatting via instant messanger? (gmail, aim, yahoo)?

How about an ftp?

thus is (FTP, HTTP, HTTPS) secure or unsecure?

If anyone knows of any links that I can read to learn more it would be deeply appreciated.

Thank you!

Last edited by importdistributors; 02-15-2010 at 09:35 AM.
importdistributors is offline   Reply With Quote
Old 02-15-2010, 10:17 AM   #2
seepy83
Platinum Member
 
seepy83's Avatar
 
Join Date: Nov 2003
Posts: 2,007
Default

I'm not going to do your homework for you. There are encrypted protocols, and there are unencrypted protocols. It shouldn't take much googling for you to determine which protocols are used by which applications, and whether or not it is secure.

If you actually need to provide a packet capture and anaylze the packets to show where the sessions start/end and what is encrypted and unencrypted, then I would start be reading the documentation provided on Wireshark's website. If you need more than that, there are classes you can attend to learn how to use Wireshark and how to do Packet Analysis.

You also could try the SANS Reading Room (http://www.sans.org/reading_room/) for papers on Encryption, Protocols, etc...
seepy83 is offline   Reply With Quote
Old 02-15-2010, 11:46 AM   #3
importdistributors
Senior Member
 
importdistributors's Avatar
 
Join Date: Sep 2004
Posts: 294
Default

Quote:
Originally Posted by seepy83 View Post
I'm not going to do your homework for you. There are encrypted protocols, and there are unencrypted protocols. It shouldn't take much googling for you to determine which protocols are used by which applications, and whether or not it is secure.

If you actually need to provide a packet capture and anaylze the packets to show where the sessions start/end and what is encrypted and unencrypted, then I would start be reading the documentation provided on Wireshark's website. If you need more than that, there are classes you can attend to learn how to use Wireshark and how to do Packet Analysis.

You also could try the SANS Reading Room (http://www.sans.org/reading_room/) for papers on Encryption, Protocols, etc...

Very nice website you recommended, Maybe a little advanced, but I like it. Thank you.
importdistributors is offline   Reply With Quote
Reply

Tags
capture, secure, unsecure, wireshark

Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -5. The time now is 04:24 AM.


Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2014, vBulletin Solutions, Inc.