WHAT IS WIRE-SHARK (ROLE IN HACKING) - DOMI-TECH

IN THIS WEBSITE YOU CAN FIND ALL TYPES OF HACKING TRICKS AND TECH TIPS GADGETS REVIEWS FOR FREE.

demo-image

WHAT IS WIRE-SHARK (ROLE IN HACKING)

Share This
Wireshark is a free and open source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, the project was renamed Wireshark in May 2006 due to trademark issues.[4]

Wireshark is cross-platform, using the Qt widget toolkit in current releases to implement its user interface, and using pcap to capture packets; it runs on Linux, macOS, BSD, Solaris, some other Unix-like operating systems, and Microsoft Windows. There is also a terminal-based (non-GUI) version called TShark. Wireshark, and the other programs distributed with it such as TShark, are free software, released under the terms of the GNU General Public License


Features

Wireshark is a data capturing program that "understands" the structure (encapsulation) of different networking protocols. It can parse and display the fields, along with their meanings as specified by different networking protocols. Wireshark uses pcap to capture packets, so it can only capture packets on the types of networks that pcap supports.

Wireshark_screenshot

>Data can be captured "from the wire" from a live network connection or read from a file of already-captured packets.

>Live data can be read from different types of networks, including Ethernet, IEEE 802.11, PPP, and loopback.

>Captured network data can be browsed via a GUI, or via the terminal (command line) version of the utility, TShark.

>Captured files can be programmatically edited or converted via command-line switches to the "editcap" program.

>Data display can be refined using a display filter.

>Plug-ins can be created for dissecting new protocols.

>VoIP calls in the captured traffic can be detected. If encoded in a compatible encoding, the media flow can even be played.

>Raw USB traffic can be captured.

>Wireless connections can also be filtered as long as they traverse the monitored Ethernet.

>Various settings, timers, and filters can be set to provide the facility of filtering the output of the captured traffic.

Comment Using!!

No comments:

Post a Comment

Pages

undefined