enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Packet analyzer - Wikipedia

    en.wikipedia.org/wiki/Packet_analyzer

    Screenshot of Wireshark network protocol analyzer A packet analyzer (also packet sniffer or network analyzer) is a computer program or computer hardware such as a packet capture appliance that can analyze and log traffic that passes over a computer network or part of a network. Packet capture is the process of intercepting and logging traffic. As data streams flow across the network, the ...

  3. Monitor mode - Wikipedia

    en.wikipedia.org/wiki/Monitor_mode

    Monitor mode, or RFMON (Radio Frequency MONitor) mode, allows a computer with a wireless network interface controller (WNIC) to monitor all traffic received on a wireless channel. Unlike promiscuous mode , which is also used for packet sniffing , monitor mode allows packets to be captured without having to associate with an access point or ad ...

  4. Wireshark - Wikipedia

    en.wikipedia.org/wiki/Wireshark

    On wireless networks, it is possible to use the Aircrack wireless security tools to capture IEEE 802.11 frames and read the resulting dump files with Wireshark. As of Wireshark 0.99.7, Wireshark and TShark run dumpcap to perform traffic capture. Platforms that require special privileges to capture traffic need only dumpcap run with those ...

  5. Kismet (software) - Wikipedia

    en.wikipedia.org/wiki/Kismet_(software)

    Kismet can also capture "Per-Packet Information" headers. Kismet also features the ability to detect default or "not configured" networks, probe requests, and determine what level of wireless encryption is used on a given access point. In order to find as many networks as possible, Kismet supports channel hopping.

  6. pcap - Wikipedia

    en.wikipedia.org/wiki/Pcap

    EtherApe, a graphical tool for monitoring network traffic and bandwidth usage in real time. Firesheep, a discontinued extension for the Firefox web browser that captured packets and performed session hijacking; iftop, a tool for displaying bandwidth usage (like top for network traffic) Kismet, for 802.11 wireless LANs

  7. Network tap - Wikipedia

    en.wikipedia.org/wiki/Network_tap

    The monitored traffic is sometimes referred to as the pass-through traffic, while the ports that are used for monitoring are the monitor ports. There may also be an aggregation port for full-duplex traffic, wherein the A traffic is aggregated with the B traffic, resulting in one stream of data for monitoring the full-duplex communication.

  8. Packet capture appliance - Wikipedia

    en.wikipedia.org/wiki/Packet_capture_appliance

    A packet capture appliance is a standalone device that performs packet capture. [1] Packet capture appliances may be deployed anywhere on a network, however, most commonly are placed at the entrances to the network (i.e. the internet connections) and in front of critical equipment, such as servers containing sensitive information.

  9. Promiscuous mode - Wikipedia

    en.wikipedia.org/wiki/Promiscuous_mode

    A non-routing node in promiscuous mode can generally only monitor traffic to and from other nodes within the same collision domain (for Ethernet and IEEE 802.11) or ring (for Token Ring). Computers attached to the same Ethernet hub satisfy this requirement, which is why network switches are used to combat malicious use of promiscuous mode.