AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
![]() ![]() It’s a major part of any IT pro’s toolkit – and hopefully, the IT pro has the knowledge to use it. ![]() The contents of suspect network transactions and identify bursts of network traffic. Cybersecurity professionals often use Wireshark to trace connections, view ![]() Wireshark has many uses, including troubleshooting networks that have performance issues. After all, when using Wireshark on a networkĬonnection (or a flashlight in a cave), you’re effectively using a tool to hunt around tunnels and tubes to see what you can see. Folks who use Wireshark on a network are kind of like those who use flashlights to see what cool things they can find. Packet sniffing can be compared to spelunking – going inside a cave and hiking around. It also allows you to visualize entire conversations and network streams.įigure 1: Viewing a packet capture in Wireshark
0 Comments
Read More
Leave a Reply. |