enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Packet analyzer - Wikipedia

    en.wikipedia.org/wiki/Packet_analyzer

    A packet analyzer used for intercepting traffic on wireless networks is known as a wireless analyzer - those designed specifically for Wi-Fi networks are Wi-Fi analyzers. [ a ] While a packet analyzer can also be referred to as a network analyzer or protocol analyzer these terms can also have other meanings.

  3. Wireshark - Wikipedia

    en.wikipedia.org/wiki/Wireshark

    Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, the project was renamed Wireshark in May 2006 due to trademark issues. [5]

  4. Sniffing attack - Wikipedia

    en.wikipedia.org/wiki/Sniffing_attack

    Sniffing attack in context of network security, corresponds to theft or interception of data by capturing the network traffic using a packet sniffer (an application aimed at capturing network packets). When data is transmitted across networks, if the data packets are not encrypted, the data within the network packet can be read using a sniffer. [1]

  5. Comparison of packet analyzers - Wikipedia

    en.wikipedia.org/wiki/Comparison_of_packet_analyzers

    Sniffer: Netscout (formerly Network General) 2013 [11] GUI Proprietary Non-free SteelCentral Transaction Analyzer OPNET Technologies/Riverbed Technology: June 9, 2014 / 17.0.T-PL1 [12] GUI Proprietary: Non-free snoop: Sun Microsystems: December 11, 2006 / Solaris 10 CLI: CDDL: Free tcpdump: The Tcpdump team April 7, 2023 / 4.99.4 [13] CLI: BSD ...

  6. Promiscuous mode - Wikipedia

    en.wikipedia.org/wiki/Promiscuous_mode

    Promiscuous mode is often used to diagnose network connectivity issues. There are programs that make use of this feature to show the user all the data being transferred over the network. Some protocols like FTP and Telnet transfer data and passwords in clear text, without encryption, and network scanners can see this data.

  7. Kismet (software) - Wikipedia

    en.wikipedia.org/wiki/Kismet_(software)

    Kismet can also capture "Per-Packet Information" headers. Kismet also features the ability to detect default or "not configured" networks, probe requests, and determine what level of wireless encryption is used on a given access point. In order to find as many networks as possible, Kismet supports channel hopping.

  8. Sniffer (protocol analyzer) - Wikipedia

    en.wikipedia.org/wiki/Sniffer_(protocol_analyzer)

    The Sniffer was implemented above Microsoft’s MS-DOS operating system, and used a 40 line 80-character text-only display. The first version, the PA-400 protocol analyzer for Token-Ring networks, [ 21 ] was released on a Compaq Portable II “luggable” computer that had an Intel 80286 processor, 640 KB of RAM, a 20 MB internal hard disk, a 5 ...

  9. Carnivore (software) - Wikipedia

    en.wikipedia.org/wiki/Carnivore_(software)

    The Carnivore system was a Microsoft Windows-based workstation with packet-sniffing software and a removable Jaz disk drive. [4] This computer must be physically installed at an Internet service provider (ISP) or other location where it can "sniff" traffic on a LAN segment to look for email messages in transit. The technology itself was not ...