fbpx

NetworkMiner – Windows Packet Analyzer & Sniffer

There are various operating system available like Windows, Linux, MAC, BSD and more but most of the penetration tester and researcher prefer to use Unix like OS like Linux and BSD, while Windows is one of the famous OS and different type of people from every corner of the world are using Windows as their primary OS. So our aim is to share the ethical hacking tools and techniques for cross platform OS so many of you can use it.

Forensic is an important division in the field of information security and penetration testing, Linux distribution like backtrack contain a list of different tools that can be used in the process of Digital forensic, some of the best tool below.


Now what about Windows, there are many tools available for windows OS that can be used in digital forensic like NetworkMiner.

What Is NetworkMiner ?

According to the official website, “NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows. NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner can also parse PCAP files for off-line analysis and to regenerate/reassemble transmitted files and certificates from PCAP files”.
Two versions are available of NetworkMiner one is the free while another is for professional (you need to purchase it)

Download


Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...