Design
The design of the network on which you will perform the experiments; and the design of your attacks, including the attacking strategies, the packets that you use in your attacks, the tools that you used, etc.
4.2 Observation
Once your network is up running, you may launch some attacks from one node and attack other nodes. Is your attack successful? How do you know whether it has succeeded or not? What do you expect to see? What have you observed?
With the help of the analysis of the network packet we can sniff the target's data and activity over the network. We by using the sniffing tools.
With the help of used port number the sniffer can guess the kind of work is getting processed by the target.
Comments
Leave a comment