packet analyzer
Sniffing () is a means of network traffic data analysis, commonly used in the field of network security, and also used in the field of business analysis, generally refers to the use of sniffer to intercept data flow and packet analysis ().
The tool used for sniffing is "sniffing tool", which is officially called "packet analyzer", and is also called "sniffer" and "packet capture tool".
use
- Analyze network problems
- business analysis
- Analyze network traffic
- Network big data financial risk control
- Detect attacks attempting to infiltrate the network
- Detect misuse of network resources by internal and external users
- Detect the impact of network intrusion
- Monitor Link Internet Broadband Traffic
- Monitor network usage traffic (including internal users, external users and systems)
- Monitor the security status of the Internet and users' computers
- Infiltration and deception
defect
- The sniffing so far has no effect on encrypted data, and it needs to be decrypted to get the required confidential data
- When the user is downloading network data files, a large number of junk data packets are sniffed out
Well-known sniffing tools
Comparison of Packet Analyzers
- CommView and CommView for WiFi ( page archive backup , stored in)
- dSniff
- Ettercap (GNU compliant open source software)
- Javvin Packet Analyzer
- The kismet
- Open Source Packet Sniffer Open Source Packet Sniffer
- Microsoft Network Monitor
- NetStumbler
- NetworkActiv PIAFCTM ( page archive backup , stored in)
- Network General
- Network Instruments
- Snoop (software) (Solaris)
- Tcpdump (man tcpdump)
- WildPackets (renamed to Savvius) AiroPeek, EtherPeek and OmniPeek
- Wireshark (formerly known as Ethereal)
- Winsock Packet Editor
- Simena Capture&Replay tools ( page archive backup , stored in)
- NetisCrossFlow
see
- Pcap