![]() ![]() User credentials (usernames and passwords) for supported protocols are extracted by NetworkMiner and displayed under the "Credentials" tab. Supported protocols for file extraction are FTP, TFTP, HTTP, and SMB. This functionality can extract and save media files (such as audio or video files) streamed across a network from websites such as YouTube. ![]() NetworkMiner can extract files and certificates transferred over the network by parsing a PCAP file or sniffing traffic directly. NetworkMiner is today used by companies and organizations all over the world. NetworkMiner has, since its first release in 2007, become a popular tool among incident response teams and law enforcement. The main view is host-centric (information grouped per host) rather than packet centric (information showed as a list of packets/frames). NetworkMiner aims to collect data (such as forensic evidence) about hosts on the network rather than collecting data regarding the network's traffic. NetworkMiner allows you to collect data (such as forensic evidence) about hosts on the network without putting any traffic on the network. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |