官术网_书友最值得收藏!

How Wireshark works

Wireshark collects network traffic from the wire through the computer's network interface, running in promiscuous mode (if needed), to inspect and display information related to protocols, IP addresses, ports, headers, and packet length. The following diagram is an illustration of how all the elements work together to display packet-level information to the user (source: https://www.wireshark.org):

Wireshark comes with the Winpcap/libcap driver, which enables NIC to the run in promiscuous mode; the only time you don't have to sniff in promiscuous mode is when the packets are directly, intentionally destined/generated to and/or from your device.

On operating systems, you should have privileges to run Wireshark. There are three processes that every protocol analyzer follows: collect, convert, and analyze. These are described as follows:

  • Collect: Choose an interface to listen to traffic and capture network packets.
  • Convert: Increase the readability of non-human-readable data. Packets are converted to easily understood information through a GUI.
  • Analyze: Analyze network traffic pertaining to the packets, protocols, raw data and more through the usage of statistical and graphical features.

As discussed in the previous chapter, protocols are the set of rules and regulations that govern the process of communication between two network devices and control the environment under which they operate.

主站蜘蛛池模板: 逊克县| 桓仁| 宿松县| 肇州县| 城市| 平阴县| 高尔夫| 嵊州市| 勐海县| 柳河县| 夏河县| 房产| 郸城县| 定襄县| 大余县| 南投县| 禹城市| 勐海县| 普安县| 阿克| 乌兰察布市| 淅川县| 内江市| 荃湾区| 大庆市| 泰来县| 子洲县| 永昌县| 西吉县| 西乡县| 威远县| 祁门县| 沈阳市| 华池县| 印江| 广河县| 鹤壁市| 常熟市| 五寨县| 德昌县| 玉山县|