The package of utilites for monitoring a network "easy Look at Net""easy Look at Net" it is the simple scanner of ports, packets sniffer and the web - pages grabber, working on computers under the control of operational systems Windows 2000/XP/2003, however all this, except packets sniffer, works and on OS Windows 98/Me, the truth, for the lack of real computers with these OS it was tested by virtual machines under the control free VMware Player:
The multithread scanner of ports now supports only TCP protocol and a full connection SYN_SENT method which is easily detected firewalls, therefore probably for the period of scanning it is necessary firewalls to disconnect.
Separate numbers of ports at input are divided by commas, the range of numbers of ports is divided on a hyphen.In the current version scanning either one host, or all hosts of a network of class C is possible.For this purpose in an address bar it is necessary to enter the IP address or a name of host in the first case or the IP address of a network of class C, zero ending, in the second case. Also, in case of scanning all network, it is recommended to choose as it is possible a smaller range of ports since time of scanning even in some streams can leave for reasonable limits, if in a network there are hosts with operational system Windows XP SP2 with started service ICS (Internet Connection Sharing).Such hosts respond only on ~ 10 requestes per second (wrote Fyodor, author NMap), increase on amount of ports and hosts...And the first practical application of the utility (you are a network administrator and scan only the own network, the truth?:) - start for the program, pass to the tab "Look at Packet", choose the necessary interface (at me their three, at you can be on miscellaneous, depending on amount of network cards), choose protocols "udp", "icmp" and press on the button "Go snif!", then on the tab "Look at Net" choose scanning all network (192.168.100.0), port 139 and press on the button "Go scan!":
Pass back in sniffer (it is possible on Ctrl + Tab) and receive result:
Hosts which do not respond on UDP packet on the closed port (13245) a ICMP packet "Destination Unreachable" and are Windows XP SP2 with started service ICS.
For work sniffer rights of the administrator of local system are required and will use it on the Internet is unsafe, to that - on modem connection the incoming traffic, that since sniffer it is executed on "raw" - socket (that is why are necessary rights of the administrator) in so-called "promiscious" mode.
On computers with operational system Win2000/XP in local network is seen all traffic, on Win9x - only ICMP packets is seen, and it is depended again with raw - sockets. Traffic is filtered on incoming and outgoing, on IP address and number of port, on protocol - now are supported TCP, UDP, ICMP, IGMP protocols.Frequency of display is adjusted from 1 till 3, 5, 10, 100 seconds, and at too small values of this parameter in high-speed networks packets can vanish. The context pop - up menu allows to be switched to display of decoded contents TCP, UDP and ICMP packets and back on display of traffic. In this menu is an opportunity of save log and contents of traffic in a text file. The decoded contents of packets and log of traffic can be copied in a clipboard for the further processing. More...
Copyright (C) 2006-2015 Look@Net Software