You are on page 1of 2

Troubleshooting and Tool Report

Mary Joy Williams

Network Problem Selected


When the team first established a connection to the internet, they noticed inbound connection
request. They need tools that can determine if those requests are from adversary reaching into
their system through a particular protocol. Determining if a request is from an adversary is
important for network security. Accepting such request can lead to enemies accessing our
sensitive information and using it to harm our operations or operations elsewhere.

Troubleshooting Steps
Step 1 – Identify the Problem
Step 2 – Establish a theory of probable Cause
Step 3 – Test theory of Probable Cause
Step 4 – Establish a Plan of Action
Step 5 – Implement Plan or escalate
Step 6 – Verify full system functionally
Step 7 – Document finds, actions, and outcomes

Through the troubleshooting steps, I have systematic approach to solving the network problem. I have
determined the problem and established a theory therefore I can now develop a plan of action.
Wireshark’s assistance will be used to troubleshoot this situation. Wireshark is a packet analyzer which
we will use to capture data from the connection.

Tool and Description


Wireshark searches host network for open ports and which I will use to scan several ports for
evidence of security breach. Hackers can use port number and application data to attack a
network. Using Wireshark, I will perform a method called packet capture, in which I will intercept
and log network traffic. In doing so, a network capture tool captures each packet of data and
decodes it.

Tool Operational Use Case


Using Wireshark or another variation of Wireshark (packet analyzers) monitors network traffic.
Therefore, when used, you can always access if your network is being breached. They examine streams
of data packet being transferred between computers on a network or the larger internet. Using
Wireshark, you can easily filter the protocols you want and be given a detail summary of each protocol
chosen. Wireshark provide coloring rules to packet list for quick analysis.
Tool Functionality
Using Wireshark, you can easily filter the protocols you want and be given a detail summary of each
protocol chosen. Wireshark provide coloring rules to packet list for quick analysis.

You might also like