Wireshark critique
Wireshark has many features as already discussed. May be to add on the list is the ability of Wireshark to support wireless networks. With the growth of wireless networks, Wireshark is seen to support this. The wireless analysis features that are found in wireshark have grown to be powerful and are used for analyzing and troubleshooting wireless network problems. It has powerful wireless network filters and good network dissectors so that it is easier to sift through a collection of wireless networks.
Seagren (2007) goes further to state that wireless network features of wireshark probes for questions regarding security. How secure is wireshark? What are the measures that have been installed in this powerful tool to curb security? Can it be used to compromise the security of a network? In the features of wireshark that are used in wired networks, there were reported cases of security holes, have these holes been sealed? these are the questions which linger in minds of those using wireshark. There are many cases of insecurity and network intrusions in wireless networks. There is therefore a need to look carefully on the security issues and implement good security measures for wireless networks.
With wireshark, it is possible to monitor other people’s traffic. This probes for questions of how privacy is maintained. Although there are policies that have been laid down to take care of other people’s security, this is only by word of mouth. There is no practical way in which this can be implemented.
Wireshark can be shared on a network. This is because the users have their own profiles which help in file sharing. This is where wireshark beats the other network analyzers. Various users can work on the same network and share their information. This is further enhanced by the export and import facility which is integrated in this tool which makes it simple to share files and information by the various users in the network.
References
Chappell, L. (2010). Wireshark network analysis: The official wireshark certified network analysis tool study guide. New York: Protocol Analysis Institute, Chappell University.
Seagren, E. (2007). Secure your network for free: Using Nmap, Wireshark, Snort, Nessus and MRTG. Rockland, MA: Syngress Publishing, Inc.