Wireshark
We’ve talked about Wireshark several times throughout this book. It is arguably the most popular network protocol analyzer utility within the world of networking and cybersecurity in use today. This tool allows its users to capture and interactively navigate through the traffic running on a computer network. However, its uses go beyond simple vulnerability and threat identification. Network administrators can use it to monitor traffic behavior and conditions to troubleshoot any performance issues and/or anomalous behavior, even if it’s not related to vulnerabilities or malicious activity. Here’s a high-level overview of Wireshark’s key features:
- Packet analysis: In short, Wireshark captures packets of information on a network and displays them in a readable format, allowing users to analyze the content of each packet in depth.
- Live capture for offline analysis: A nice feature of Wireshark is that while users can capture the packets...