Primary: Exploitation.
Secondary: N/A.
It is a tool to analyze protocols, it is used to analyze and solve problems in network communications for software development and protocols. It has all the standard features of a protocol analyzer only hollow form.
Supported Operating System:
Operative mode: Passive.
Process the network traffic generated by the applications (Web, Client / Server, Web services.
Reports:
Output reports: ✔
Capture a request for a Web application (HTTP).
Within the "Capture" section, select the required network interface for capture of packages, in this case “ens33”.
The tool will begin to collect all the generated packages from the specified network interface.
Capture HTTP POST requests.
The next Wireshark filter will show all the captured HTTP POST requests/responses.
The application is accessed through a Web browser and is navigated within the application in order to make multiple requests (connections) to the server. The tool will register the made requests. In this case, an insecure login process was made.
Select some of the requests, right click and select the option "Follow TCP Stream".
The tool will show a new window, which the made request by the application to the server, can be viewed.
Link: http://www.wireshark.org
Author(s): Gerald Combs
License: GNU General Public License version 2.
Version: v2.6.8