enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Wireshark - Wikipedia

    en.wikipedia.org/wiki/Wireshark

    Wireshark is very similar to tcpdump, but has a graphical front-end and integrated sorting and filtering options.. Wireshark lets the user put network interface controllers into promiscuous mode (if supported by the network interface controller), so they can see all the traffic visible on that interface including unicast traffic not sent to that network interface controller's MAC address.

  3. tcpdump - Wikipedia

    en.wikipedia.org/wiki/Tcpdump

    tcpdump is a data-network packet analyzer computer program that runs under a command line interface. It allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached. [3] Distributed under the BSD license, [4] tcpdump is free software.

  4. Packet analyzer - Wikipedia

    en.wikipedia.org/wiki/Packet_analyzer

    Serve as the primary data source for day-to-day network monitoring and management; Spy on other network users and collect sensitive information such as login details or users cookies (depending on any content encryption methods that may be in use) Reverse engineer proprietary protocols used over the network; Debug client/server communications

  5. Comparison of packet analyzers - Wikipedia

    en.wikipedia.org/wiki/Comparison_of_packet_analyzers

    Non-free snoop: Sun Microsystems: December 11, 2006 / Solaris 10 CLI: CDDL: Free tcpdump: The Tcpdump team April 7, 2023 / 4.99.4 [13] CLI: BSD License: Free Wireshark (formerly Ethereal) The Wireshark team November 22, 2021 / 4.0.6 [14] Both GNU General Public License: Free Xplico: The Xplico team May 2, 2019 / 1.2.2 [15] Both GNU General ...

  6. Network traffic measurement - Wikipedia

    en.wikipedia.org/wiki/Network_traffic_measurement

    Network performance could be measured using either active or passive techniques. Active techniques (e.g. Iperf) are more intrusive but are arguably more accurate. Passive techniques have less network overhead and hence can run in the background to be used to trigger network management actions.

  7. Scapy - Wikipedia

    en.wikipedia.org/wiki/Scapy

    Scapy is a packet manipulation tool for computer networks, [3] [4] originally written in Python by Philippe Biondi. It can forge or decode packets, send them on the wire, capture them, and match requests and replies. It can also handle tasks like scanning, tracerouting, probing, unit tests, attacks, and network discovery.

  8. Packet Sender - Wikipedia

    en.wikipedia.org/wiki/Packet_Sender

    Troubleshooting network devices that use network clients (devices that "phone home" via UDP, TCP, or SSL—Packet Sender can capture these requests) Testing and development of new network protocols (send a packet, see if device behaves appropriately) Reverse-engineering network protocols for security analysis (such as malware)

  9. pcap - Wikipedia

    en.wikipedia.org/wiki/Pcap

    Scapy, a packet manipulation tool for computer networks, written in Python by Philippe Biondi. Snort, a network-intrusion-detection system. Suricata, a network intrusion prevention and analysis platform. Symantec Data Loss Prevention, Used to monitor and identify sensitive data, track its use, and location. Data loss policies allow sensitive ...