Wireshark: Difference between revisions

From SecurityTools
(→‎More Information: Added StationX Wireshark cheatsheet web page.)
m (Tiny tidying-up change, add link to Udemy Wireshark course plus instructor's Twitter account.)
 
Line 10: Line 10:
=== More Information ===
=== More Information ===


* [https://www.wireshark.org/docs/ Official Wireshark documentation] website
* The [https://www.wireshark.org/docs/ Official Wireshark documentation] website
* Udemy offers the [https://www.udemy.com/course/wireshark-ultimate-hands-on-course/ ultimate hands-on course] for learning Wireshark from tool expert [https://twitter.com/packetpioneer/ Chris Greer]
*Laura Chappell's [https://www.amazon.com/Wireshark-101-Essential-Analysis-Solution/dp/1893939758/?tag=securitytoo08-20 Wireshark 101: Essential Skills for Network Analysis - Second Edition] book
*Laura Chappell's [https://www.amazon.com/Wireshark-101-Essential-Analysis-Solution/dp/1893939758/?tag=securitytoo08-20 Wireshark 101: Essential Skills for Network Analysis - Second Edition] book
*[https://unit42.paloaltonetworks.com/wireshark-workshop-videos/ Unit 42 Wireshark workshop] video tutorials collection
*[https://unit42.paloaltonetworks.com/wireshark-workshop-videos/ Unit 42 Wireshark workshop] video tutorials collection

Latest revision as of 20:56, 23 September 2023

Description[edit | edit source]

Wireshark is a free and open-source network protocol analyzer that works on all major operating systems. Wireshark was originally named Ethereal, but changed its name in 2006 due to trademark issues. The tool can be downloaded from the official site, and copious documentation and tutorials are also available there.

For full functionality, Wireshark needs to be run in promiscuous mode. This requires root or administrator privileges, depending on the operating system. It can be run with normal user privileges, but this limits the tool to only sniffing packets to and from the host machine.

Tool Type[edit | edit source]

More Information[edit | edit source]

Similar tools[edit | edit source]