

Much like most network packet analyzers, Wireshark tunes in with a network connection in real-time and captures whole streams of traffic – as many as thousands of packets at once.Īfter this, it can check all captured data by applying filters and getting rid of all irrelevant information – thus, you’ll get only the information that’s worth checking out.Īnd then, finally, like any solid packet sniffer, Wireshark will let you dive deep into a network packet while allowing you to visualize the whole conversation and network streams. The Lua menu structure is set by a in the Wireshark install directory.(Image credit: Wireshark) Features and functionalityīeing one of the most popular packet sniffers on the planet, Wireshark is also packed with features that provide three primary functionalities - packet capture, filtering (opens in new tab), and network visualization. See “Lua Support in Wireshark” in the Wireshark Developer’s Guide. These options allow you to work with the Lua interpreter optionally built into Wireshark.

The window dialog provides you the packet number where the credentials have been found, the protocol that provided them, the username and protocol specific information. Some of the dissectors (ftp, http, imap, pop, smtp) have been instrumented to provide the module with usernames and passwords and more will be instrumented in the future. This allows you to extract credentials from the current capture file. Menu item is greyed out unless one (and only one) frame is selected in the packet list. It is assumed that the rules will be applied to an outside interface. Rules for MAC addresses, IPv4 addresses, TCP and UDP ports, and IPv4+port combinations are supported. This allows you to create command-line ACL rules for many different firewall products, including Cisco IOS, Linux Netfilter (iptables), OpenBSD pf and Windows Firewall (via netsh).
