- Wireshark Network Security
- Piyush Verma
- 358字
- 2021-07-16 13:27:58
The tools of the trade
There are numerous free and commercial packet sniffers, very often named network analyzers, in the market, and selecting the one that best meets your need is a matter of choice. There are several factors to determine this, such as the operating system in use, supported set of protocols, ease of use, customizability, and of course budget. The following are the popular ones:
- Tcpdump: Tcpdump is a free and popular command-line packet capture utility, which can come in very handy in the absence of a GUI-based tool. However, even after capturing traffic via tcpdump, one can analyze and interpret the traffic using any GUI-based free or commercial tool, as it is visually easy. Refer to TCPDUMP Overview at http://www.tcpdump.org/manpages/tcpdump.1.html.
- Nagios Network Analyzer and OmniPeek: These are commercial-grade network analyzers that provide organizations with packet analysis capabilities with some unique features of their own. The pricing for these products can be seen on their inpidual websites.
- Wireshark: Wireshark, formerly known as Ethereal, is free and open source, and is the most popular packet analyzer out there. It works across multiple platforms and supports a huge set of protocol families with an easy-to-use GUI. Refer to http://wiki.wireshark.org/ProtocolReference/.
Apart from the dedicated sniffer tools we just introduced, packet sniffing capability and modules come integrated in many of the popular security-related tools, such as Snort, Metasploit, and Scapy, to name a few. Snort started off as a sniffer and later used its sniffing capabilities to develop into what we know today as the popular network intrusion prevention system (NIPS) and network intrusion detection system (NIDS) solution.
Another example is the presence of the sniffer
module in Metasploit. After successfully compromising a machine using Metasploit, one can execute this module and start sniffing traffic on that compromised box for further enumeration. Sniffing options available with Metasploit are shown as follows:

Another excellent option is using sniff()
in Scapy. Scapy is a packet manipulation tool written in Python and can be used to generate, craft, and decode packets and capture them. It is helpful in many security testing-related activities.
The focus of this book is "Wireshark". So, let's get started.
- Python量化投資指南:基礎(chǔ)、數(shù)據(jù)與實(shí)戰(zhàn)
- 技術(shù)領(lǐng)導(dǎo)力:程序員如何才能帶團(tuán)隊(duì)
- 數(shù)據(jù)庫系統(tǒng)原理及MySQL應(yīng)用教程
- Android 7編程入門經(jīng)典:使用Android Studio 2(第4版)
- AngularJS深度剖析與最佳實(shí)踐
- 假如C語言是我發(fā)明的:講給孩子聽的大師編程課
- Python忍者秘籍
- Learning Laravel's Eloquent
- Visual Basic程序設(shè)計(jì)實(shí)驗(yàn)指導(dǎo)(第二版)
- Mastering Linux Security and Hardening
- Flowable流程引擎實(shí)戰(zhàn)
- 編寫高質(zhì)量代碼:改善Objective-C程序的61個(gè)建議
- 從零開始:UI圖標(biāo)設(shè)計(jì)與制作(第3版)
- 愛上C語言:C KISS
- 現(xiàn)代C:概念剖析和編程實(shí)踐