packet-sniffers

Wireshark localhost traffic capture [closed]

て烟熏妆下的殇ゞ 提交于 2019-11-27 16:57:37
I wrote a simple server app in C which runs on localhost. How to capture localhost traffic using Wireshark? cnicutar If you're using Windows it's not possible - read below. You can use the local address of your machine instead and then you'll be able to capture stuff. See CaptureSetup/Loopback . Summary: you can capture on the loopback interface on Linux, on various BSDs including Mac OS X, and on Digital/Tru64 UNIX, and you might be able to do it on Irix and AIX, but you definitely cannot do so on Solaris, HP-UX... . Although the page mentions that this is not possible on Windows using

How to intercept packets sent by an application and check their header and content? [closed]

血红的双手。 提交于 2019-11-27 13:08:18
问题 I'd like to know how can I intercept packets sent by a certain application and then to check what those packets contain. I need some advice what to do because I've never done such a thing and I want to learn by myself. 回答1: Pcap.Net Pcap.Net is a .NET wrapper for WinPcap written in C++/CLI and C#. It Features almost all WinPcap features and includes a packet interpretation framework. SharpPcap SharpPcap is a cross-platform packet capture framework for the .NET environment, based on the famous

Sniffer for localhost (Windows OS) [closed]

拟墨画扇 提交于 2019-11-27 10:43:47
I am looking for a sniffer that can work with the loopback address in Windows. So far, I found Microsoft Network Monitor which is a nice tool, but for localhost it's useless because on Windows, localhost packets don't pass through the regular network stack, so they're invisible to an ethernet sniffer like MS Network Monitor. How do you debug applications that send data in the loopback mechanism? Any good (open source) sniffers that can work with localhost? UPDATE: If you have experience with a tool, it would be nice to have a short description for future reference Rafael Nobre I was faced with

Wireshark localhost traffic capture [closed]

不问归期 提交于 2019-11-27 04:10:08
问题 Closed . This question needs to be more focused. It is not currently accepting answers. Want to improve this question? Update the question so it focuses on one problem only by editing this post. Closed 12 months ago . I wrote a simple server app in C which runs on localhost. How to capture localhost traffic using Wireshark? 回答1: If you're using Windows it's not possible - read below. You can use the local address of your machine instead and then you'll be able to capture stuff. See

How to test which version of TLS my .Net client is using

北城以北 提交于 2019-11-27 01:13:39
问题 I support a .NET site which (amongst many, MANY, other things) talks to remote APIs from supplier systems. We want to upgrade to support TLS 1.2 We're hoping to do so as per this question: Are there .NET implementation of TLS 1.2? But how do I check that this is actually working once I've made the change. Ideally one of my supplier sites would start using TLS 1.2 ONLY and then my test could just be "can we talk to that supplier now?" But we don't have that. I'm guessing I can do something

How do I programatically collect packets from passively sniffing? [closed]

…衆ロ難τιáo~ 提交于 2019-11-26 23:17:50
问题 I want to test the vulnerability of the server I just wrote against man in the middle attacks. How (on Mac OS X) do I analyze packets. (I'll be checking where they are going, pulling information from if they are heading to my server, and seeing what all is available) Then I'll figure out a way to encrypt everything... but first things first. Any help on packet sniffing would be greatly appreciated. My preferred language is java. But I can do C++. so, my question is: "Is there any sort of API

Sniffer for localhost (Windows OS) [closed]

被刻印的时光 ゝ 提交于 2019-11-26 15:18:06
问题 Closed. This question is off-topic. It is not currently accepting answers. Want to improve this question? Update the question so it's on-topic for Stack Overflow. Closed 6 years ago . I am looking for a sniffer that can work with the loopback address in Windows. So far, I found Microsoft Network Monitor which is a nice tool, but for localhost it's useless because on Windows, localhost packets don't pass through the regular network stack, so they're invisible to an ethernet sniffer like MS