Enhance Wireshark with these coding and leveraging tools
In this chapter download from Writing Security Tools and Exploits, learn how to enhance and tweak Wireshark (formerly known as Ethereal), focusing on the leveraging and coding tools used to interact with it. Program a protocol dissector to see how Wireshark calls a dissector and learn how to best integrate it into Wireshark. Next, study the various structures needed to retrieve and process a data packet. Then, explore advanced topics that will allow you to give your dissector even more functionality. Finally, study Wireshark's two interfaces, graphical and textual, and its tap modules.
Title: Writing Security Tools and Exploits
Author: James C. Foster
Publisher: Syngress Publishing
Chapter 8: Coding for Ethereal
ISBN: 1597499978; Copyright 2005, Syngress Publishing. All rights reserved.
Used with permission from the publisher. Available from booksellers or direct from Syngress Publishing