
Wireshark – Wire shark is a free and open source packet data analysis software or application commonly used for network troubleshooting, analysis and educational tools.
At the beginning of its appearance, this software was called Etheral, but in May 2006 it was changed to Wire shark due to trademark problems.
Along with the development of technology, Wire shark is now more widely used as a hack tool, especially by professional hackers.
Because this software is considered capable of carrying out the hack process, when compared to other hacked applications or sites
Some data that can be read directly by this application ranging from Ethernet, FDDI, Wireless LAN, ATM connections and others.
Well, here we will share a full review and how to hack using the Wireshark application that can be applied.
Wireshark
1. Wireshark Features
![]() |
| Wireshark Features |
Just like other applications, Wire shark also has a variety of advanced and cool features, which will help its users in doing many things.
Some of the features of Wireshark that you should know include:
- Multiplatform. Can be used for several operating system bases including Unix, Mac, Windows and Linux.
- Able to display network protocol information from complete data packets.
- The data package can be saved as a file and can be reopened later for further analysis.
- Filtering network data packets.
- Looking for data plans with more specific requirements.
- Coloring for the appearance of data packets to make analysis easier.
- Display statistical data
- Wires hark requires a physical device NIC (Network Interface Card), to capture data packets that go out and into the network.
2. How to Hack Using Wireshark
![]() |
| How to Hack Using Wireshark |
As for how to hack using Wireshark which can be applied as follows:
- For the first step, you have to download and install the Wire shark application first via the following link (Download the Wire shark App).
- Then open the application after it is installed and you will see the interface of the application.
- Choose a network that has a connection to the internet. In this process, we use the ethernet network as the network source, guys. If you have, then you select the Capture menu and select Start to start viewing data traffic on your computer network.
- Choose a website that provides a login system and visit the site. To find out the data traffic that occurs, please look at the Wire shark guys. To make it easier, you can search for visited web traffic by filling the filter with http. Now, in the network info, look for the one that says POST, because it is an address that is visited using the login system.
- Finally, please right-click the data packet that says POST> Follow then click TCP Stream.
- Automatically, you can see the password, username and email that was entered in the previous login site.
3. The Right Time To Use Wireshark
![]() |
| The Right Time To Use Wireshark |
So that this application can function optimally, it is necessary to pay attention to when is the right time to use it guys.
- Using the application after troubleshooting network problems is complete.
- Use the app to test for security issues.
- Using the application to debug the protocol implementation.
- Learn network protocols.
The final word
Thus a brief review of the Wire shark application that can be learned and can be used as a guide before use.
This application can be used to do many things, one of which is doing the hacking process.
So that no party is harmed, we recommend using the application correctly and wisely.


