Throughout this book, I’ve demonstrated several tools and libraries you can use in network protocol analysis, but I didn’t discuss many that I use regularly. This appendix describes the tools that I’ve found useful during analysis, investigation, and exploitation. Each tool is categorized based on its primary use, although some tools would fit several categories.
As discussed in Chapter 2, passive network capture refers to listening and capturing packets without disrupting the flow of traffic.
License Commercial; free of charge
The Microsoft Message Analyzer is an ...