MS Windows

Capturing Packet Traffic with VLAN Tags on Windows

Capturing network traffic with VLAN tags on a Windows computer can be tricky due to how network adapters and capture software handle VLAN-tagged frames. By default, Windows often strips VLAN tags before passing packets to capture applications like Wireshark. However, there are ways to configure your setup to properly capture VLAN information. 1. Install the […]

Capturing Packet Traffic with VLAN Tags on Windows Read More »

What is the ‘nslookup’ command, and how can I use it?

The nslookup command is a built-in network administration tool available on Windows, macOS, and many Linux distributions. It is used to query DNS servers to retrieve information about domain names, IP addresses, and DNS records. Basic Syntax: nslookup [hostname] [DNS server] Components: Common Use Cases: Example Output: Query a Domain: nslookup example.com Output: Server: dns.googleAddress:

What is the ‘nslookup’ command, and how can I use it? Read More »

Configuring Windows Firewall Rules using netsh

Windows Firewall allows you to control the traffic entering and leaving your system through various rules. You can create and configure firewall rules to permit or block specific network activities. Below are some examples of Windows Firewall rules, including inbound and outbound rules: Example 1: Allow Inbound Traffic on a Specific Port (e.g., HTTP –

Configuring Windows Firewall Rules using netsh Read More »

Usage Instructions for Our Windows Networking Toolkit

If you use Windows and you are a Networking person technical or non-technical, you will find our toolkit to put all the useful Windows capabilities at your fingertips in a simple menu driven batch file. Before we start, you can download and install this toolkit here (instructions for installing are provided on that page). Here

Usage Instructions for Our Windows Networking Toolkit Read More »

Our Windows (and Linux) Networking Toolkits

Well folks, I have decided to make this toolkit available to all. Just download it here. The Linux bash version can be downloaded here. Yes, Windows offers several built-in tools and utilities that can help with networking tasks and commands. Here’s an overview of some of the most useful tools: The problem is these are

Our Windows (and Linux) Networking Toolkits Read More »

Messing Around with IPv6 Temporary Addresses in Windows

Yesterday I wanted to mess around with IPv6 Temporary addresses on my computer. Let me start with an overview of IPv6 Temporary addresses. IPv6 Temporary Addresses are a feature designed to enhance privacy for devices using the IPv6 protocol. In the IPv6 addressing scheme, devices typically have both a permanent (static) address and one or

Messing Around with IPv6 Temporary Addresses in Windows Read More »

Find and Display All Your Wi-Fi Passwords in Windows

If you have been to one of my Wireshark or Wi-Fi classes then you know I often criticize Microsoft Windows for some of its – well – inexplicable approaches to usage and security.  Here is yet another example. Windows stores several important pieces of information in Wi-Fi profiles to facilitate automatic connections to known networks

Find and Display All Your Wi-Fi Passwords in Windows Read More »

How to Decrypt HTTPS on Windows in Wireshark

Check out these great references as well:  Our custom profiles repository for Wireshark  Our Udemy course on Wireshark   Our Udemy course on Wireless Packet capture Whenever your web browser connects to a web server using HTTPS, a secure connection is established, keys are exchanged, and the traffic is encrypted.  We won’t spend any time in

How to Decrypt HTTPS on Windows in Wireshark Read More »

Packet Capture in Windows using pktmon.exe

Microsoft has added a packet sniffing/packet capture tool in the latest Windows 10 update. We have previously discussed using the ‘netsh’ command to do packet capture in Windows (see my article here). The pktmon tool is new.  What does this mean?  Is it better than netsh?  Does it integrate with Wireshark? Well, it means you

Packet Capture in Windows using pktmon.exe Read More »

Windows WLAN/Wi-Fi Commands of Interest

Check out these great references as well:  Our Wireless custom profile for Wireshark  Our Udemy course on Wireless Packet capture  Our other Wi-Fi related articles There are several other articles that we have written on various Windows 10 WLAN/Wi-Fi commands that you can execute to perform various important wireless information gathering and management.  We will

Windows WLAN/Wi-Fi Commands of Interest Read More »

Viewing the WLAN/Wi-Fi details via the WLAN Report in Windows 10

WIndows 10 has several interesting WLAN/Wi-Fi commands you can run from the Windows 10 command or Powershell.  One of them is the WLAN Report.  It takes two steps to view this information. Step 1. Run Windows CMD as Administrator. Then enter the command: netsh wlan show wlanreport Here is an example output: Note that the

Viewing the WLAN/Wi-Fi details via the WLAN Report in Windows 10 Read More »

What are all the Microsoft local area connections?

Using Wireshark in Microsoft Windows reveals some quirks that naturally leave you scratching your head as to what is going on.  For example, when I launch Wireshark on my Windows 10 system I see a bunch of different interfaces.  Some make sense (Wi-Fi, Ethernet 2) but others….: What are all the Local Area Connections?  What

What are all the Microsoft local area connections? Read More »

Deleting Remembered Wi-Fi Networks in Windows, MAC OSx, and Linux (Debian)

If you attend our WLAN Operations course, one of the things we discuss is Active Scanning.  Your system uses your saved Wi-Fi networks to actively scan for those networks (probing).  There are potential security risks in this, especially with free networks.  Most students conclude they should not remember networks in this way.  The burning question

Deleting Remembered Wi-Fi Networks in Windows, MAC OSx, and Linux (Debian) Read More »

Contact Us Here


Please verify.
Validation complete :)
Validation failed :(
 
Your contact request has been received. We usually respond within an hour, but please be patient. We will get back to you very soon.
Scroll to Top