- Wireshark 2 Quick Start Guide
- Charit Mishra
- 209字
- 2021-06-25 20:45:48
How Wireshark works
Wireshark collects network traffic from the wire through the computer's network interface, running in promiscuous mode (if needed), to inspect and display information related to protocols, IP addresses, ports, headers, and packet length. The following diagram is an illustration of how all the elements work together to display packet-level information to the user (source: https://www.wireshark.org):

Wireshark comes with the Winpcap/libcap driver, which enables NIC to the run in promiscuous mode; the only time you don't have to sniff in promiscuous mode is when the packets are directly, intentionally destined/generated to and/or from your device.
On operating systems, you should have privileges to run Wireshark. There are three processes that every protocol analyzer follows: collect, convert, and analyze. These are described as follows:
- Collect: Choose an interface to listen to traffic and capture network packets.
- Convert: Increase the readability of non-human-readable data. Packets are converted to easily understood information through a GUI.
- Analyze: Analyze network traffic pertaining to the packets, protocols, raw data and more through the usage of statistical and graphical features.
As discussed in the previous chapter, protocols are the set of rules and regulations that govern the process of communication between two network devices and control the environment under which they operate.
- 云原生安全:攻防實(shí)踐與體系構(gòu)建
- 數(shù)據(jù)恢復(fù)方法及案例分析
- Metasploit Penetration Testing Cookbook(Second Edition)
- 網(wǎng)絡(luò)空間攻防技術(shù)原理
- 計算機(jī)病毒分析與防范大全(第3版)
- Learning Devise for Rails
- 計算機(jī)網(wǎng)絡(luò)安全技術(shù)研究
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- CTF那些事兒
- Learning Pentesting for Android Devices
- 網(wǎng)絡(luò)安全實(shí)戰(zhàn)詳解(企業(yè)專供版)
- 網(wǎng)絡(luò)攻防實(shí)戰(zhàn)研究:MySQL數(shù)據(jù)庫安全
- 云計算安全技術(shù)與應(yīng)用
- Web代碼安全漏洞深度剖析
- 黑客攻防入門