请输入您要查询的百科知识:

 

词条 Wireshark
释义

  1. Functionality

  2. History

  3. Features

  4. Security

  5. Color coding

  6. Simulation packet capture

  7. See also

  8. Notes

  9. References

  10. External links

{{Use mdy dates|date=May 2018}}{{Infobox software
| name = Wireshark
| logo = File:Wireshark Logo.svg
| screenshot =
| caption = Wireshark GUI
| author = Gerald Combs[1]
| developer = The Wireshark team
| released = 1998
| latest release version = 3.0.0[2]
| latest release date = {{Start date and age|2019|2|28}}
| latest preview version =
| latest preview date =
| operating system = Cross-platform
| programming language = C, C++
| genre = Packet analyzer
| license = GNU GPLv2[3]
| website = {{URL|https://www.wireshark.org/}}
}}Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, the project was renamed Wireshark in May 2006 due to trademark issues.[4]

Wireshark is cross-platform, using the Qt widget toolkit in current releases to implement its user interface, and using pcap to capture packets; it runs on Linux, macOS, BSD, Solaris, some other Unix-like operating systems, and Microsoft Windows. There is also a terminal-based (non-GUI) version called TShark. Wireshark, and the other programs distributed with it such as TShark, are free software, released under the terms of the GNU General Public License.

Functionality

Wireshark is very similar to tcpdump, but has a graphical front-end, plus some integrated sorting and filtering options.

Wireshark lets the user put network interface controllers into promiscuous mode (if supported by the network interface controller), so they can see all the traffic visible on that interface including unicast traffic not sent to that network interface controller's MAC address. However, when capturing with a packet analyzer in promiscuous mode on a port on a network switch, not all traffic through the switch is necessarily sent to the port where the capture is done, so capturing in promiscuous mode is not necessarily sufficient to see all network traffic. Port mirroring or various network taps extend capture to any point on the network. Simple passive taps are extremely resistant to tampering{{Citation needed|date=June 2013}}.

On GNU/Linux, BSD, and macOS, with libpcap 1.0.0 or later, Wireshark 1.4 and later can also put wireless network interface controllers into monitor mode.

If a remote machine captures packets and sends the captured packets to a machine running Wireshark using the TZSP protocol or the protocol used by OmniPeek, Wireshark dissects those packets, so it can analyze packets captured on a remote machine at the time that they are captured.

History

In the late 1990s, Gerald Combs, a computer science graduate of the University of Missouri–Kansas City, was working for a small Internet service provider. The commercial protocol analysis products at the time were priced around $1500[5] and did not run on the company's primary platforms (Solaris and Linux), so Gerald began writing Ethereal and released the first version around 1998.[6] The Ethereal trademark is owned by Network Integration Services.

In May 2006, Combs accepted a job with CACE Technologies. Combs still held copyright on most of Ethereal's source code (and the rest was re-distributable under the GNU GPL), so he used the contents of the Ethereal Subversion repository as the basis for the Wireshark repository. However, he did not own the Ethereal trademark, so he changed the name to Wireshark.[7] In 2010 Riverbed Technology purchased CACE[8] and took over as the primary sponsor of Wireshark. Ethereal development has ceased, and an Ethereal security advisory recommended switching to Wireshark.[9]

Wireshark has won several industry awards over the years,[10] including eWeek,[11] InfoWorld,[12][13][14][15][16] and PC Magazine.[17] It is also the top-rated packet sniffer in the Insecure.Org network security tools survey[18] and was the SourceForge Project of the Month in August 2010.[19]

Combs continues to maintain the overall code of Wireshark and issue releases of new versions of the software. The product website lists over 600 additional contributing authors.

Features

Wireshark is a data capturing program that "understands" the structure (encapsulation) of different networking protocols. It can parse and display the fields, along with their meanings as specified by different networking protocols. Wireshark uses pcap to capture packets, so it can only capture packets on the types of networks that pcap supports.

  • Data can be captured "from the wire" from a live network connection or read from a file of already-captured packets.
  • Live data can be read from different types of networks, including Ethernet, IEEE 802.11, PPP, and loopback.
  • Captured network data can be browsed via a GUI, or via the terminal (command line) version of the utility, TShark.
  • Captured files can be programmatically edited or converted via command-line switches to the "editcap" program.
  • Data display can be refined using a display filter.
  • Plug-ins can be created for dissecting new protocols.[20]
  • VoIP calls in the captured traffic can be detected. If encoded in a compatible encoding, the media flow can even be played.
  • Raw USB traffic can be captured.[21]
  • Wireless connections can also be filtered as long as they traverse the monitored Ethernet.{{Clarify|reason="Wireless" in what sense? Wi-Fi or mobile phone network? And by "filtered" do you mean "captured"?|date=March 2015}}
  • Various settings, timers, and filters can be set to provide the facility of filtering the output of the captured traffic.

Wireshark's native network trace file format is the libpcap format supported by libpcap and WinPcap, so it can exchange captured network traces with other applications that use the same format, including tcpdump and CA NetMaster. It can also read captures from other network analyzers, such as snoop, Network General's Sniffer, and Microsoft Network Monitor.

Security

Capturing raw network traffic from an interface requires elevated privileges on some platforms. For this reason, older versions of Ethereal/Wireshark and tethereal/TShark often ran with superuser privileges. Taking into account the huge number of protocol dissectors that are called when traffic is captured, this can pose a serious security risk given the possibility of a bug in a dissector. Due to the rather large number of vulnerabilities in the past (of which many have allowed remote code execution) and developers' doubts for better future development, OpenBSD removed Ethereal from its ports tree prior to OpenBSD 3.6.[22]

Elevated privileges are not needed for all operations. For example, an alternative is to run tcpdump or the dumpcap utility that comes with Wireshark with superuser privileges to capture packets into a file, and later analyze the packets by running Wireshark with restricted privileges. To emulate near realtime analysis, each captured file may be merged by mergecap into growing file processed by Wireshark. On wireless networks, it is possible to use the Aircrack wireless security tools to capture IEEE 802.11 frames and read the resulting dump files with Wireshark.

As of Wireshark 0.99.7, Wireshark and TShark run dumpcap to perform traffic capture. Platforms that require special privileges to capture traffic need only dumpcap run with those privileges. Neither Wireshark nor TShark need to or should be run with special privileges.

Color coding

Wireshark can color packets based on rules that match particular fields in packets, to help the user identify the types of traffic at a glance. A default set of rules is provided; users can change existing rules for coloring packets, add new rules, or remove rules.

Simulation packet capture

Wireshark can also be used to capture packets from most network simulation tools such as ns, OPNET Modeler and NetSim.[23]

See also

{{Portal|Free and open-source software}}
  • Capsa (software)
  • Comparison of packet analyzers
  • EtherApe
  • Fiddler (software)
  • netsniff-ng
  • Ngrep
  • Omnipeek
  • Tcptrace

Notes

1. ^{{cite web | url = https://www.wireshark.org/about.html | publisher = The Wireshark Foundation | title = Wireshark - About | accessdate = January 30, 2018}}
2. ^{{cite web | url = https://www.wireshark.org/news/20190228.html | publisher = The Wireshark Foundation | title = Wireshark 3.0.0 Released | date = 28 February 2019 | accessdate = 1 March 2019}}
3. ^{{cite web | url = https://www.wireshark.org/faq.html#sec1 | title = Wireshark FAQ License}}
4. ^{{cite web|url=https://www.wireshark.org/faq.html#q1.2|title=Wireshark FAQ|accessdate=December 31, 2011}}
5. ^{{cite magazine |url=https://books.google.com/books?id=PzwEAAAAMBAJ&pg=PA101-IA9&dq=netXray |magazine=InfoWorld |date=November 17, 1997 |title=Gussied-up NetXRay takes on enterprise features |others=The price is at the top right of the page}}
6. ^{{cite web |url=http://www.protocog.com/gerald_combs_interview.html |title= Q&A with the founder of Wireshark and Ethereal|work= Interview with Gerald Combs|publisher=protocolTesting.com |accessdate=July 24, 2010 |archive-url=https://web.archive.org/web/20160307232509/http://www.protocog.com/gerald_combs_interview.html |archive-date=March 7, 2016}}
7. ^{{cite web |url=https://www.wireshark.org/faq.html#q1.2 |title=What's up with the name change? Is Wireshark a fork? |work=Wireshark: Frequently Asked Questions |accessdate=November 9, 2007}}
8. ^{{cite web|url=http://www.riverbed.com/us/company/news/press_releases/2010/press_102110.php |title=Riverbed Expands Further Into The Application-Aware Network Performance Management Market with the Acquisition of CACE Technologies |publisher=Riverbed Technology |date=October 21, 2010 |accessdate=October 21, 2010}}
9. ^{{cite web|url=http://ethereal.com/appnotes/enpa-sa-00024.html |title=enpa-sa-00024 |publisher=Ethereal |date=November 10, 2006 |accessdate=June 8, 2010 |deadurl=yes |archiveurl=https://web.archive.org/web/20121023150134/http://ethereal.com/appnotes/enpa-sa-00024.html |archivedate=October 23, 2012 }}
10. ^{{cite web |url=https://www.wireshark.org/about.html |title=Awards and Accolades |work=Wireshark: About |accessdate=September 20, 2010}}
11. ^{{cite web |url=http://www.eweek.com/slideshow_viewer/0,1205,l=&s=25947&a=206265&po=6,00.asp?p=y |title= Wireshark | work = The Most Important Open-Source Apps of All Time |publisher=eWEEK |accessdate=August 12, 2012| author =eWEEK Labs|date=May 28, 2012}}
12. ^{{cite web | url=http://www.infoworld.com/article/2649627/networking/best-of-open-source-in-networking.html | title=Best of open source in networking | work=InfoWorld | date=September 10, 2007 | accessdate=December 1, 2014 | author=Yager, Tom}}
13. ^{{cite web|url=http://www.infoworld.com/article/2638694/techology-business/best-of-open-source-software-awards--networking.html |title=Best of open source software awards: Networking |publisher=InfoWorld |date=August 5, 2008 |accessdate=April 28, 2015}}
14. ^{{cite web | url=http://www.infoworld.com/article/2606792/open-source-software/bossie-awards-2012--the-best-open-source-networking-and-security-software.html#slide15 | title=Bossie Awards 2012: The best open source networking and security software | work=InfoWorld | date=September 18, 2012 | accessdate=April 28, 2015 | author=Mobley, High}}
15. ^{{cite web | url=http://www.infoworld.com/article/2687032/open-source-software/119872-Bossie-Awards-2012-The-best-open-source-networking-and-security-software.html#slide18 | title=Bossie Awards 2013: The best open source networking and security software | work=InfoWorld | date=September 17, 2013 | accessdate=April 28, 2015 | author=Ferrill, Paul}}
16. ^{{cite web | url=http://www.infoworld.com/article/2688076/networking/networking-164815-bossie-awards-2014-the-best-open-source-networking-and-security-software.html#slide8 | title=Bossie Awards 2014: The best open source networking and security software | work=InfoWorld | date=September 29, 2014 | accessdate=April 28, 2015 | author=Garza, Victor R.}}
17. ^{{cite news |url=https://www.pcmag.com/article2/0,2817,2360043,00.asp |title= Wireshark 1.2.6 | work = Wireshark 1.2.6 Review & Rating |publisher=PC Magazine |accessdate=September 20, 2010 |first=Samara |last=Lynn}}
18. ^{{cite web |url=http://sectools.org/sniffers.html |title= Wireshark is No. 1 of Top 14 Packet Sniffers |publisher=Insecure.Org |accessdate=August 12, 2012}}
19. ^{{cite web |url=http://sourceforge.net/blog/blog/potm-201008/ |title= Wireshark, SourceForge Project of the Month, August 2010 |publisher=SourceForge |accessdate=August 12, 2012}}
20. ^{{cite web|title=Dissector compilation example|work=OmniIDL|url=http://www.arena.free.fr/?article=Dev/Wireshark|accessdate=April 18, 2013}}
21. ^{{cite web|title=USB capture setup|work=Wireshark Wiki|url=http://wiki.wireshark.org/CaptureSetup/USB|accessdate=December 31, 2011}}
22. ^{{cite web|url=http://www.openbsd.org/cgi-bin/cvsweb/ports/net/ethereal/Attic/Makefile?hideattic=0&only_with_tag=HEAD |title=CVS log for ports/net/ethereal/Attic/Makefile |publisher=Openbsd.org |date= |accessdate=June 8, 2010}}
23. ^{{Cite web|url=https://www.scribd.com/document/90008434/Wireshark-opnet|title=Wireshark opnet {{!}} Transmission Control Protocol {{!}} Internet Protocols|website=Scribd|access-date=January 14, 2018}}

References

{{refbegin}}
  • {{Cite journal| first1 = Angela | last1 = Orebaugh | first2 = Gilbert | last2 = Ramirez | first3 = Jay | last3 = Beale | date = February 14, 2007 | title = Wireshark & Ethereal Network Protocol Analyzer Toolkit | publisher = Syngress | page = 448 | isbn = 1-59749-073-3 | url = http://www.syngress.com/hacking-and-penetration-testing/Wireshark-amp-Ethereal-Network-Protocol-Analyzer-Toolkit/ | postscript = }}
  • {{Cite journal| first1 = Chris | last1 = Sanders | date = May 23, 2007 | title = Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems | publisher = No Starch Press | page = 192 | isbn = 1-59327-149-2 | url = http://nostarch.com/packet.htm | postscript = }}
  • {{Cite journal| first1 = Laura | last1 = Chappell | date = March 31, 2010 | title = Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide | publisher = Protocol Analysis Institute, dba “Chappell University” | page = 800 | isbn = 1-893939-99-5 | url = http://www.wiresharkbook.com/ | postscript = }}
  • {{Cite journal| first1 = Roy | last1 = Cheok | date = July 1, 2014 | title = Wireshark: A Guide to Color My Packets | publisher = SANS Institute | url = http://www.sans.org/reading-room/whitepapers/detection/wireshark-guide-color-packets-35272 | postscript = }}

External links

{{Commons}}
  • {{Official website}}
{{Authority control}}

14 : Packet analyzer software that uses GTK|Software that uses Qt|Software that was ported from GTK+ to Qt|Free software programmed in C|Free software programmed in C++|Cross-platform free software|Lua-scriptable software|Network analyzers|Free network management software|Unix network-related software|Windows network-related software|MacOS network-related software|Web scraping|Pentesting software toolkits

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/16 10:58:16