Cyber Security

Wireshark Traffic generators

These tools will either generate traffic and transmit it, retransmit traffic from a capture file, perhaps with changes, or permit you to edit traffic in a capture file and retransmit it. Bit-Twist includes bittwist, to retransmit traffic from a capture…

Wireshark Monitoring/tracing tools

The following tools can process the libpcap-format files that Wireshark and TShark produce or can perform network traffic capture and analysis functions complementary to those performed by Wireshark and TShark. In brackets you will find the program license and the…

Tools related to NetworkTroubleshooting and alike.

dumpcap shipped with Wireshark, already mentioned at the "Internal" section above Microsoft Message Analyzer Microsoft's newest tool for capturing, displaying, and analyzing protocol messaging traffic and to trace and assess system events and other messages from Windows components Microsoft Network…

Wireshark Wrappers

dumpcapui - A GUI front-end for dumpcap.exe that helps you in setting up dumpcap.exe captures and allows storing and retrieving of those settings at a later time. (Windows) Net::Sharktools - Use Wireshark's packet dissection engine from Perl (blog entries: 1 …

Wireshark scripts

dumpcap.bat A batch file front-end for dumpcap.exe. It allows you to save dumpcap.exe settings, be notified of capture events or trigger dumpcap.exe capturing after a capture event occurs. It also provides hooks for performing custom actions through user-defined batch files,…

Wireshark Internal command line tools

Wireshark Internal command line tools Published in Ethical Hacking font size decrease font size increase font size Internal command line tools are shipped together with Wireshark. These tools are useful to work with capture files. capinfos is a program that…

Block Transposition Cipher

A block transposition cipher operates by rearranging groups of characters. A cipher can be categorized based on the type of operation it uses to convert a plain text message into a cipher-text message. There are two basic operations that a…

Gramm–Leach–Bliley Act

The Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999, (Pub.L. 106–102, 113 Stat. 1338, enacted November 12, 1999) is an act of the 106th United States Congress (1999–2001). It repealed part of the Glass–Steagall Act…

Rainbow table

A rainbow table is a pre-computed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a plaintext password up to a certain length consisting of a limited set of characters. It is…