This repository contains a project focused on capturing and analyzing live network packets. The goal is to demonstrate the process of using Wireshark to inspect network traffic, identify different protocols, and understand how devices communicate over a network.
Network traffic is the flow of data across a computer network. Think of it like cars moving on a highway. Just as cars carry people and goods from a source to a destination, data travels from a sender (like a web server) to a receiver (like your laptop) across the network. This traffic consists of everything you do online, from Browse websites and sending emails to streaming videos.
To travel across the network efficiently, data is broken down into small, manageable pieces called packets. Imagine trying to send a large book through the mail; it's easier and more reliable to send it page by page. Each packet contains a small portion of the total data, along with crucial information like the sender's address, the receiver's address, and the protocol being used. Once all the packets arrive at their destination, they are reassembled in the correct order.
Protocols are the rules and standards that govern communication between devices on a network. They are like a shared language that both the sender and receiver agree to use. Different protocols have different jobs. For example:
- TCP (Transmission Control Protocol): Ensures that all packets arrive in the correct order and without errors. It's like sending a registered letter that requires a signature upon receipt.
- UDP (User Datagram Protocol): Sends packets quickly but doesn't guarantee delivery or order. It's like sending a regular postcard—fast, but with no confirmation.
- DNS (Domain Name System): Translates human-readable website names (like
google.com) into computer-readable IP addresses.
Wireshark is a powerful and free tool known as a network protocol analyzer or "packet sniffer",When you "capture" traffic with Wireshark, you are essentially telling it to record a copy of every single packet that travels across your network interface . This allows you to look inside the packets to see the raw data, identify the protocols being used, diagnose network problems, and understand how applications communicate in the background.