Note that it is a criminal act to scan or sniff on any network traffic without any clearance to do so, otherwise using it may land you in jail. Output can be exported to XML, PostScript, CSV, or plain text.Coloring rules can be applied to the packet list for quick, intuitive analysis.Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2.Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on your platform). ![]() Capture files compressed with gzip can be decompressed on the fly.Read/write many different capture file formats: tcpdump (libpcap), Pcap NG, Catapult DCT2000, Cisco Secure IDS iplog, Microsoft Network Monitor ….The most powerful display filters in the industry.Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility.Multi-platform: Runs on Windows, Linux, macOS, Solaris, FreeBSD, NetBSD, and many others. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |