enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Monitor mode - Wikipedia

    en.wikipedia.org/wiki/Monitor_mode

    Monitor mode, or RFMON (Radio Frequency MONitor) mode, allows a computer with a wireless network interface controller (WNIC) to monitor all traffic received on a wireless channel. Unlike promiscuous mode , which is also used for packet sniffing , monitor mode allows packets to be captured without having to associate with an access point or ad ...

  3. Wireshark - Wikipedia

    en.wikipedia.org/wiki/Wireshark

    Wireshark is very similar to tcpdump, but has a graphical front-end and integrated sorting and filtering options.. Wireshark lets the user put network interface controllers into promiscuous mode (if supported by the network interface controller), so they can see all the traffic visible on that interface including unicast traffic not sent to that network interface controller's MAC address.

  4. Comparison of packet analyzers - Wikipedia

    en.wikipedia.org/wiki/Comparison_of_packet_analyzers

    Microsoft Network Monitor: Yes No No No No No OmniPeek (formerly AiroPeek, EtherPeek) Yes No No No No No snoop: No No No No Yes No tcpdump: Yes (WinDump) Yes Yes Yes Yes AIX, HP-UX, IRIX, Tru64 UNIX: Wireshark (formerly Ethereal) Yes Yes Yes Yes Yes AIX, HP-UX, IRIX, Tru64 UNIX: Xplico: No No Yes No No No

  5. Promiscuous mode - Wikipedia

    en.wikipedia.org/wiki/Promiscuous_mode

    A non-routing node in promiscuous mode can generally only monitor traffic to and from other nodes within the same collision domain (for Ethernet and IEEE 802.11) or ring (for Token Ring). Computers attached to the same Ethernet hub satisfy this requirement, which is why network switches are used to combat malicious use of promiscuous mode.

  6. Packet analyzer - Wikipedia

    en.wikipedia.org/wiki/Packet_analyzer

    On wired broadcast and wireless LANs, to capture unicast traffic between other machines, the network adapter capturing the traffic must be in promiscuous mode. On wireless LANs, even if the adapter is in promiscuous mode, packets not for the service set the adapter is configured for are usually ignored.

  7. Microsoft Network Monitor - Wikipedia

    en.wikipedia.org/wiki/Microsoft_Network_Monitor

    Microsoft Network Monitor (Netmon) is a deprecated packet analyzer. It enables capturing, viewing, and analyzing network data and deciphering network protocols . It can be used to troubleshoot network problems and applications on the network.

  8. pcap - Wikipedia

    en.wikipedia.org/wiki/Pcap

    A capture file saved in the format that libpcap, WinPcap, and Npcap use can be read by applications that understand that format, such as tcpdump, Wireshark, CA NetMaster, or Microsoft Network Monitor 3.x. The file format is described by Internet-Draft draft-ietf-opsawg-pcap; [5] the current editors' version of the draft is also available. [6]

  9. Network tap - Wikipedia

    en.wikipedia.org/wiki/Network_tap

    One way this can work, for fiber-based network technologies, is that the tap divides the incoming light using a simple physical apparatus into two outputs, one for the pass-through, one for the monitor. This can be called a passive tap. Other taps use no power or electronics for the pass-through, but do use power and electronics for the monitor ...