- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 186字
- 2021-06-30 19:15:54
Wireshark
This is a very popular tool among both hackers and pen testers. Wireshark is famous for scanning networks. The tool captures data packets in a target network and displays them in a verbose format, which is human readable. The tool allows hackers or pen testers to deeply analyze network traffic to the level of inspecting individual packets.
Wireshark works in two modes. The first one is the network-capturing mode. It can be left running on a victim's website for a long time while capturing all the network traffic. In the second mode, the network capturing has to be stopped in order to enable deep analysis. From here, a user of the tool can see the network traffic and start mining for insecurely exchanged passwords or to determine the different devices on the network. It is the most important functionality of the program. Wireshark has a Conversations feature under the Statistics menu that allows a user to view communication between computers.
Figure 6 shows a Wireshark interface with its separate sections and the type of information that they contain:

- Cybersecurity:Attack and Defense Strategies
- 嵌入式應(yīng)用程序設(shè)計綜合教程(微課版)
- 高性能Linux服務(wù)器構(gòu)建實戰(zhàn):運維監(jiān)控、性能調(diào)優(yōu)與集群應(yīng)用
- 玩到極致 iPhone 4S完全攻略
- 新手易學(xué):系統(tǒng)安裝與重裝
- Linux集群和自動化運維
- 深入Linux內(nèi)核架構(gòu)與底層原理(第2版)
- Windows Phone應(yīng)用程序開發(fā)
- jQuery UI Cookbook
- Windows 8實戰(zhàn)從入門到精通(超值版)
- INSTANT Galleria Howto
- 分布式高可用架構(gòu)之道
- 嵌入式微系統(tǒng)
- Docker容器技術(shù)與應(yīng)用
- Angular權(quán)威教程