{"id":755,"date":"2008-02-27T10:38:05","date_gmt":"2008-02-27T10:38:05","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2008\/02\/networkminer-passive-sniffer-packet-analysis-tool-for-windows\/"},"modified":"2015-09-09T19:39:36","modified_gmt":"2015-09-09T11:39:36","slug":"networkminer-passive-sniffer-packet-analysis-tool-for-windows","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2008\/02\/networkminer-passive-sniffer-packet-analysis-tool-for-windows\/","title":{"rendered":"NetworkMiner – Passive Sniffer & Packet Analysis Tool for Windows"},"content":{"rendered":"

NetworkMiner is a passive network sniffer\/packet capturing tool for Windows with an easy to use interface. It can detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner can also parse PCAP files for off-line analysis.<\/p>\n

NetworkMiner makes use of OS fingerprinting databases from both p0f (by Michal Zalewski) and Ettercap (by Alberto Ornaghi and Marco Valleri) in order to do as correct passive OS fingerprinting as possible. NetworkMiner also uses the MAC-vendor list from Nmap (Fyodor).<\/p>\n

The purpose of NetworkMiner is to collect data about hosts on the network rather than to collect data regarding the traffic on the network. The main view is host centric (information grouped per host) rather than packet centric (information showed as a list of packets\/frames).<\/p>\n

NetworkMiner can extract files transferred over the network by parsing a PCAP file or by sniffing traffic directly from the network. This is a neat function that can be used to extract and save media files<\/a> (such as audio or video files) which are streamed across a network.<\/p>\n