The Promiscuous mode is a specific receive mode for network-technology devices such as wireless network cards. It is normally used for packet sniffing and bridged network for hardware virtualization. The frames include the MAC (Media Access Control) address of the hardware.
FTP is very useful to share resources. Install a client, configure the FTP server IP address, enter the username and password, then we can download from the server and upload as well. It’s simple right? But have you ever been aware that your FTP password could be sniffed by a hacker?
Using a packet analyzer software (aka. packet sniffer, network analyzer, protocol sniffer, protocol analyzer) to capture network traffic to analyze and troubleshoot network problem is an important job for network management. The charm of packet analyzer software is that you can use them to listen on a cable and know what the machines are transmitting and communicating with other hosts. This blog post covers the basics that where you should capture with a packet analyzer software on your network so you get traffic to your interest.
Most business organizations use WAN links to interconnect local area networks (LANs) at geographically dispersed sites. Over the years, as business organizations continue to grow both nationally and globally, the demand for WAN links has steadily increased.
Capsa Free is a must-have freeware network analyzer for Ethernet monitoring, troubleshooting and analysis. It provides users with great experience to learn how to monitor network activities, pinpoint network problems,enhance network security and so on. Moreover, Capsa Free is a perfect choice for students, teachers and computer geeks to learn protoclos and networking technology knowledge.
Network monitoring has multiple uses in business and home environments. The most common use of network monitoring in business is monitoring web visits, such as Facebook, twitter, etc., and monitoring employee’s emails, online chat messages (MSN, Yahoo Messenger, ICQ, etc.). So the IT department will know the percentage of time their employees spend on work, and the percentage on personal entertainment. It’s also applicable to home uses that parents would like to keep an eye on their children’s activities.
MAC address scanner and IP address scanner are networking tools that network administrators use to scan what MAC addresses and IP addresses are in their LAN. This post introduces the featured and powerful MAC address scanner and IP address scanner on the web that help in network management.
I wanted to see what the apps on my iPhone do and as I searched around, most of the current methods seem to involve jail-breaking, setting up hubs and access points and other such cumbersome nastiness. Gotta be simpler than that. So we are releasing a simple libpcap tool that you can run on your Mac to intercept packets from any app on any mobile device. iPad, iPhone, Android are all fair game. Once you can capture, you can very easily fuzz and scale test with Mu Studio.
Ever wanted to see your iPhone’s wireless network traffic? All you need is a wireless LAN and the cross-platform proxy application, Paros. Paros was built for web application security assessments, so it provides an intimate hook into the HTTP request/response flow.
Wireless network is the new type of computer network that it doesn’t required any type of cable to connect the devices up. This post introduces how to prepare for wireless traffic monitoring, the wireless traffic monitoring freeware and also wireless traffic monitoring equipment.