answersLogoWhite

0


Best Answer

Alone, Wireshark is not a significant threat. provided that no hubs are used on a network and switches are not attacked (see Macoff) then a user running wireshark will only see traffic from their own host (see micro-segmentation).

Wireshark and other packet sniffing programs should only be used by administration staff on networks as traditional users have no legitimate use for them.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Is Wireshark a security threats
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What are the most popular network security devices?

There are many network security devices available and the best one might depend on what industry one is part of. However the most recommended devices are Nessus which is a vulnerability scanner, Wireshark for packet sniffers and Snorth which is an intrustion detection system.


What is the best example for security and safety?

Best program VIPRE is a leading provider of Internet security solutions protecting businesses, solution providers & home users from costly and malicious cyber threats. VIPRE includes comprehensive endpoint & email security & real-time malware analysis.VIPRE is a leading provider of Internet security solutions protecting businesses, solution providers & home users from costly and malicious cyber threats. VIPRE includes comprehensive endpoint & email security & real-time malware analysis. cutt.ly/flEHH17


What support is offered for Norton Internet Security products?

Norton Internet Security products detect and eliminate threats before they ever reach a PC. Norton Internet Security products block dangerous websites and scams, scan Facebook and other social networks for unsafe downloads and suspicious links, and help protect children from inappropriate websites and content.


Why Wireshark is not decrypting the captured wpa file even i have correct password and essid?

I tried to capture a file where network using security as below:[WPA-PSK-CCMP-TKIP]i am trying to insert a WPA Pre-shared Key in wire shark preferences under the protocol of IEEE 802.11 but when i enter a correct key nothing happen anyway to identify and fix this problem?


What is software threats?

No

Related questions

could threats to data security may be direct threats to the database?

threats to data security may be _____ threats to the database ?


Which of the following is not a category of security threats?

Incomplete questions, where "the following" doe not follow, is definitely not a category of security threats!


Which two agencies oversee homeland security and bioterrorism threats?

The Department of Defense oversees homeland security and bioterrorism threats.


Different between security and threats?

Security means feeling safe from harm. Threats are words to make you feel unsafe.


What should a security plan should address?

Most companies, and even families, have security plans. A security plan should identify possible threats, analyze said threats as to plan strategies to reduce the chances of those threats happening, and a plan ready in case one of the threats does occur.


Is physical security a human safeguard against security threats?

Yes


How IP accounting helps the administrator to analyze the security threats to a network?

how ip accounting helps the administrator to analyze security threats of a network?


What is the security triple?

Threats, Assets, and Vulnerabilities.


Why should you use Wireshark?

WireShark is a great tool for analyzing networks, finding bottlenecks, or for analyzing attacks.


What Risk is determined from the analysis of available safeguards for IS assets security requirements threats and?

What Risk is determined from the analysis of available safeguards for IS assets security requirements threats and?


What are five potential security threats in a law office?

no


What are non-traditional security threats?

The world has faced threats to security as a result of military action, politics and diplomacy. But in the modern age there are also so-called non-traditional threats to the survival and development of a sovereign state, and even mankind, to consider. These non-traditional threats come in the form of terrorism, drug trafficking, serious communicable diseases, piracy, illegal Immigration, environmental security, economic and financial security, and information security. Also international inmigration is taken as a non traditional security threat