TightVNC and Colasoft Packet Builder Lab

 Welcome to the remote access and packet analysis lab! In this lab, I will learn how to perform remote access using TightVNC and how to use Colasoft Packet Builder to analyze IP packet headers.

The first part of this lab will focus on using TightVNC for remote access. TightVNC is a popular open-source remote desktop software that allows us to access and control a computer from a remote location. This can be useful in a variety of situations, such as when you need to access a computer that is not physically located near you, or when you need to provide technical support to someone who is not in the same location as you.

To use TightVNC, I will need to install the software on both the computer that I want to access remotely (the server) and the computer that you will use to access the server (the client). Once the software is installed, I can start the TightVNC server on the server and the TightVNC viewer on the client. The viewer  prompts me  to enter the IP address or hostname of the server, as well as the password that I set when I initially installed TightVNC on the server. Once this information is entered, I will be connected to the server and will be able to control it as if you were sitting in front of it.

I can’t really show images of this as it is dangerous because someone could access my computer.

Some of the benefits I see with remote access are:

1: Flexible Work

With Remote access the employees have freedom to work from home or any other location, this helps them to be more productive as they can be relaxed while working

2: Low cost for Business

Remote access means there is no need for having an office building to accommodate people, the organization can just rent a small enclosure for the server equipment, which would cut back the cost a lot which would otherwise be spent on maintaining a space for all employees

3: Centralized Storage and Full control of Authorization access

There is little to no guarantee that the data on a standalone workstation is even being backed up properly and the activity on that workstation is also out of reach, but with remote workspace, the organization can ensure that critical data is being backed up to the servers regularly and remote access also provides the benefit of logging all the activity on a network

The second part of this lab will focus on using Colasoft Packet Builder to analyze IP packet headers. Colasoft Packet Builder is a packet generation and editing tool that allows you to create and modify IP packets. This can be useful for a variety of purposes, such as testing network protocols and simulating network scenarios.

I first went into Wireshark and utilized one of the packets I found to make a Colasoft packet. To use Colasoft Packet Builder, first I will need to download and install the software on my computer. Once it's installed, I launched the application and start creating packets. To create a packet, I needed to specify the various fields in the packet header, such as the source and destination IP addresses, the protocol, and the packet size. I can also add payload data to the packet if I wanted to. Once I have configured the packet to your liking, you can send it over the network by clicking the "Send" button but I won’t do that.


In addition to creating packets, Colasoft Packet Builder also allows you to edit and decode existing packets. To do this, you can use the packet capture feature to capture packets from the network, and then use the packet editor to modify the packets as needed. The packet decoder will then show you the various fields in the packet header and payload in a more readable format. 

In conclusion, we have successfully learned how to perform remote access using TightVNC and how to use Colasoft Packet Builder to analyze IP packet headers. TightVNC allows us to remotely access and control another computer over the internet, making it a useful tool for remotely managing and troubleshooting systems. We also learned how to use Colasoft Packet Builder to create and analyze custom IP packets, which is useful for understanding how packets are constructed and how they flow through a network


Comments

Popular posts from this blog

Vulnerability Management(Nessus)

Active Directory Home Lab

Lab 2 Access Controls