If you run an enterprise level network, then you probably know about all the different pitfalls that can affect your network and data operations.
Malware, internal and external threats and hackers can all present challenges to your network performance and security.
A packet sniffer can help you to investigate traffic on your network down to the smallest detail.
You can inspect headers and frame information from packets of data and will help you to discover things like false addressing, hidden payloads and many other important pieces of information.
What does a packet sniffer do?
A packet sniffer goes by man different names that you might have heard before, like protocol analyzer or network analyzer.
You can get dedicated hardware versions of these devices that plug directly into the network, or software derivatives like the ones we will be looking at it today.
They look at the data flows on your network and drill down into the details so that you can find irregularities and abnormalities that are acting upon your network so that you can take action and mitigate any threats and fix any issues before they become a much bigger problem.
Why would you use a packet sniffer?
A packet sniffer is not the be all and end all of network analysis.
Instead, it forms one of many different avenues of investigation and troubleshooting.
You would therefore use a packet sniffer to help you accomplish goals that your antivirus, antimalware, firewall, data loss prevention, and many other services and applications cannot assist with.
Instances where a packet sniffer will help you to get information from your environment are plentiful, especially where there are complicated setups with multiple layers of routing and lots of users and devices.
How does a packet sniffer actually work?
A packet sniffer simply opens up a channel to listen to network flows.
It intercepts all data flowing across its interface, and if not configured to filter out anything then it will grab every single instance of data as it is detected.
It does not necessarily have any intelligence behind it while it performs data gathering operations.
After your packet sniffing has been completed and you save your capture file onto your computer you can perform additional steps on it to find specific fingerprints of malicious behavior and items of interest that need to be investigated further.
Best way to use packet sniffers?
The best way to use a packet sniffer is to plan your investigation before you even get started.
You need to think about the identified issue that you are trying to investigate, and then think about the potential attack vectors that it could be comping from.
If your target device is running in a production environment, then you need to understand how the additional load of a packet sniffer might affect your operations.
If there is a specific issue that occurs randomly then you need to be ready to run your packet capture operation when they incident begins.
This means that additional resource planning and availability needs to be planned out as well.
Here are the Best Sniffing Tools and Software for Enterprise Network Monitoring:
SolarWinds Network Performance Monitor
SolarWinds Network performance Monitor is a tool that needs little introduction.
As well as being a monitoring and alerting solution it also offers a wide variety of troubleshooting and analysis tools.
This includes a packet sniffing implementation that is called Network Packet Sniffer.
If you work in IT and you are responsible for looking after your network then you need a network sniffing tool.
SolarWinds has a solid packet sniffing capability build into all of their software probes.
Simply deploy a probe to a device that you would like to investigate, and it will start probing the device and pulling meta data.
Once you have collected enough of a sample then you can start to apply different levels of investigation against the capture file.
Where this application really excels is in the reporting department.
The application is accessible over the internet so you can monitor multiple sites from a single location.
Because of the nature of the network scan, you can identify performance issues such as a quality of experience (QoE) and that it helps you to visualize the data on your network.
SolarWinds NPM also gives you the ability your plug in your NetFlow data as well as configuration and server details, giving you a rich source of packet capture data.
This will help especially when there is a complicated network issue for you to troubleshoot.
The packet analyzer tool also helps you to identify issues such as performance impedance and slow performance.
It has a built-in packet metric analyzer with over 1200 predefined templates and also allows you to categorize data in different segments.
All of this comes together to give you a comprehensive performance monitoring solution that is easy to setup and use.
Pricing options start at $2,995 for a perpetual license, while a subscription model starts at $1,583 for monitoring for full pricing check out the quotation page here for a customized quote on NPM.
Paessler PRTG Network Monitor Packet and Sniffing Tool
PRTG offers many different network monitoring solutions for fully integrating your monitoring and alerting solutions into the same platform.
For this review we will be outlining this as well as the free to download Packet Sniffing tool that they offer.
It is a general-purpose packet capturing utility that gives you access to low level meta data within your organization’s network traffic.
By using both of these tools in conjunction with one another you will learn far more about your current network setup than you thought possible.
As with most monitoring solutions, PRTG looks to help you to fix issues before they become widespread and operationally detrimental to your business.
It works by ensuring that you are notified before an issue causes an outage while increasing network traffic efficiency and data flow.
With this application you can also monitor data usage to help shape your view of the current state of your networks.
PRTG implements various types of sensors throughout your network on key network components.
IT reports back to you if any irregularities are detected and alerts you of what the issue could be.
All of these sensors gather data continuously.
There is a specific sensor for packet sniffing which helps you to isolate specific data packet types and then action them accordingly.
With the packet sniffer you can easily identify data traffic types such as web traffic, internet relay chat, Citrix, P2P, and file copies such as FTP as well as email.
PRTG only grabs data from the header of data packets, leaving the packet payload alone.
This makes it far more efficient for the packet sniffer to do its work as there is less data that it needs to process in order to alert you to any issues.
PRTG also has NetFlow and JFlow sensors that give you more details about the Cisco or Juniper network equipment that you have installed at your site.
This makes troubleshooting a while lot easier too.
The packet sniffer sensor has a graphical interface which makes it easy to use and simple to see what is happening within the application.
If you would like to download a trial version then you can register here to receive you free trial version.
You will receive an unlimited full version for 30 days after which it will revert to a limited functionality version which is free to run but consists of only 100 sensors.
Pricing: Pricing for PRTG starts at $1,750 for 500 sensors and offers packages with customized pricing for sensor counts starting at 20,000.
You can find that information right here.
ManageEngine NetFlow Analyzer
Like many of the packet sniffers that we have looked at today, ManageEngine NetFlow Analyzer offers its own spin on the technology within the application itself.
It runs on different operating systems, namely Windows, Linux and even iOS as well as Android for mobile devices.
NetFlow analyzer is an advanced suite of network-based tools that will give you deep insight into the technical elements of your network.
Netflow Analyzer allows you to monitor bandwidth usage as well as capture data packets for inspection.
From the main console window, you can view the most active devices on your network, which can help you to enforce network usage policies if you find any discrepancies.
The main area of technical analysis comes from the NetFlow, J-Flow, IP FIX and other integrations.
This gives the application a much better integration layer, giving you the ability to tap into devices on a data packet level.
NetFlow Analyzer then grabs this flow data and creates statistical models that are human readable.
The best part is that the graph generation is done in real time, giving you unprecedented access to your network’s inner mechanics on demand.
If you notice any strange behavior you can escalate the problem before it turns into something far more serious.
The Top Talkers view on the network dashboard is especially useful for identifying bandwidth abuse.
If you have a specific device on your network that needs to be inspected, then you can select specific interfaces on a device and home in on activity on a minute scale.
You can view the current traffic on the device by monitoring the in and out traffic and even see what speed the device is transmitting at, as well as the packets being transmitted and received.
This is a user-friendly application that doesn’t lack in the information display department.
Some more technical users might find command-based sniffing tools more to their liking, but from a reporting aspect this is a great tool to consider for your own enterprise network.
If you would like to try it out for yourself then you can find the download page here.
Select the version for your operating system and then install it to try it out for 30 days as a trial for free.
If you would like a demo then you can check out the online demo section of their website here.
Pricing: Click here for an online quotation.
Savvius LiveAction Omnipeek Network Protocol Analyzer
Savvius LiveAction Omnipeek Network Protocol Analyzer offers a product that gives you enhanced visibility on your network.
It helps you to quickly and easily identify and resolve network issues such as bottlenecks and outages as they occur.
It can identify and decode over 1000 different protocols, making it much easier for you to understand what is happening on your network.
No matter what your network monitoring needs are in the real time analysis arena, you can count on LiveAction.
It has real-time support for all network segment types, 1/10/40/100 Gigabit, 802.11 (wireless), Voice over IP and Video over IP, as well as any other protocol that you can think of monitoring in your enterprise network environment.
LiveAction also offers integrated Flow and packet-level analysis.
This gives you the ability to view details about Flow enabled devices.
This helps you to forensically and methodically troubleshoot your network when issues occur.
To help defend against issues before they occur you can use LiveAction to generate automated alerts based on criteria that you configure yourself.
You can align the alerts with network policies, and you can create your own views to show you the most important network information.
This gives you the best of both worlds between packet analysis, packet sniffing and real time alerts.
Like many of the other products that we have looked at today, there is a large graphical component to LiveAction that makes it especially useful for looking at network activity without an incomprehensible mountain of logs and lines of network traffic details.
Instead, all of the data is transformed into intuitive and easy to understand graphical representations of network activity.
This takes a forensic approach to network and application performance monitoring.
It makes it convenient to get to the core details of each issue as they become available.
One of the best features is that LiveAction offers monitoring and visibility across multiple network nodes both local and remote.
This increases your capabilities when it comes to troubleshooting and diagnosing application level errors and issues at remote locations like national branches, WAN connections and even connectivity between data centers.
The company also offers a hardware device caked the Omnipeek Wifi adaptor.
It is a USB adapter that captures Wifi packet data, which makes it a very useful capture device for on site visits where Wifi analysis is necessary.
If you would like to try it out for yourself then you can create an account and add a 30 day trial to your cart here.
Pricing: Pricing information is available from their sales team, which can be found here.
For many IT professionals WireShark is the first stop when looking to capture network packets.
The first reason is that the application is free and open source.
The second reason is that it is very powerful, and when used correctly it is a powerful tool that can give you details about the packet flow on your network.
IT is able to create PCAP files from live data flows which are analyzed after the capture has been completed.
The application itself is easy to use in the sense that starting a capture is very straight forward, however the difficulty comes in analyzing the data.
To the untrained eye, there is a lot of data that doesn’t make much sense. In order to understand what the difference between TCP and UDP packets, you need to have a basic understanding of how network protocols communicate.
This is no problem for network specialists that work with various layers of the OSI model, but for a casual network user there is a lot of information to cover.
The functionality of WireShark is enhanced when you apply plugins to your capture files.
Wireshark’s default mode captures everything that passes through the Network Interface Card, which means that the plugins limit the scope of that default behavior.
You can specify the parameters of your search so that you filter out the packets that you don’t want to investigate.
The great thing about this tool is that it can be used by network engineers to troubleshoot issues and by security engineers to investigate potential security issues.
You can drill down into the details of each packet and see what data is being transmitted within the packet itself.
WireShark is a powerful tool that can get you all the information that you need, but it is very easy to pull in too much information and lose track of what you are trying to analyze.
If you would like to try it out for yourself then you can download it for free from here. It is available on Windows, Mac and Linux, as well as a few other operating systems.
You can take on some WireShark training from here if you would like to learn how to use this powerful opensource tool.
Pricing: This application is free and opensource and is under active development.
Telerik Fiddler is a niche tool that is useful for sniffing HTTP packets.
It allows you to grab data from a browser or any other application that processes HHP packets.
If you are a developer trying to troubleshoot some code, then this is a very useful tool.
While it may be a little esoteric for most people looking to capture network data, it definitely has its use cases.
The application has undergone a recent user interface refresh, which has made it easier to use and much more intuitive for developers to analyze the output of their applications.
For software developers this is a very useful tool that will give you the run down on your web application’s behavior.
It can offer you an alternative troubleshooting platform to use as opposed to using the web browser’s built in error console.
Debugging is important when developing software applications and debugging traffic from multiple operating systems is not easy.
You can analyze the state of cookies, headers as well as caching.
The great thing is that it supports multiple frameworks such as .Net, Java and Ruby.
It is also a great way to send modify requests as well as responses on websites.
This allows developers to test out web applications when they receive requests, and what data they send out.
For prolonged and automated testing, Fiddler is able to utilize Fiddler Everywhere to record and log all HTTP and HTTPS protocols.
If you are using an application that supports a proxy then you can debug applications from Chrome, Safari, Firefox, Opera and Edge.
Once you have captured your traffic, you can share it with the res of your team and collaborate to improve your code.
The process is simple and is done through the Fiddler application itself.
To help with the collaborative features you can highlight and mark details within the sessions, add comments and even share captured sessions over a cloud-based service with the rest of your team.
Fiddler is available in 3 different flavors.
Fiddler Classic is a debugging tool that runs on Microsoft Windows. FiddlerCore is a .Net library that lets you capture HTTP and HTTPS traffic as well as modify it.
Fiddler Cap is a companion tool that also captures web-based traffic.
If you would like to try it out for yourself then you can download the free version from here.
Pricing: Pricing starts at $12 a month per user. Full details for pricing can be found here
This is a forensic network tool that is able to intercept data from protocols such as SMTP and IMAP, which are 2 of the protocols that are used when sending emails.
It is able to intercept password hashes, FTP file transfer data and HTTP objects that are transmitted.
This tool can be used to help and secure your network, especially if you are trying to ensure that your users are not exposing company information accidentally.
The NetworkMiner tool is under active development and is being improved on still to this day.
The website still features an active blog as well, which is always good to see with a project such as this.
In addition to all of these features, NetworkMiner can also parse PCAP and PcapNG files and it also has IPv6 support.
If you are trying to get information about the security certificates in use on your network then you can also use this tool to extract X.509 certificates from encrypted connections that are using SSL.
The tool is very useful for in depth testing on a network and it is housed within a very basic GUI.
This is not a bad thing, as simple is normally better with applications like this.
There is not much in the way of graphical representations of data in graphs or charts, so if you are hoping to use this tool for generating reports then you will have to combine the detailed output from your captures in this application with another graphing tool like Microsoft Excel.
NetworkMiner is capable of exporting to CSV, Excel formats, XML, CASE and JSON-LD. NetworkMiner Professional offers advanced features like extracting audio data from VoIP calls, as well as OSINT lookups of file hashes, IP addresses, domain names and website URLs.
All of these features are aimed at network and security professionals, so using them requires a fair amount of technical knowledge as well as organizational knowledge and understanding of the systems that you are running these tools against.
NetworkMiner runs on Windows and Linux and is a capable and very handy network sniffer.
It gives you simple data such as banner information, software version numbers, sessions, hostnames, open ports on a host, and much more without putting traffic onto the network that it is monitoring.
This is good for masking the activity of these tests as you often do not want your test machine putting data onto the network if you are running monitoring and alerting on the system.
If you would like to try out NetworkMoiner then you can download the free version from here.
Pricing: NetworkMiner starts at $900 for the professional version, while the free version can be downloaded directly from the NetworkMiner website.
There are plenty of capturing tools available for you to try out, whether you are a security professional, network engineer or developer, there is an option out there for you.
SolarWinds offers a comprehensive solution with Network Performance monitor. It allows you to capture packets and analyze network traffic at the same time.
It offers alerting, monitoring and logging in an easy to use interface that is quick to setup and start using.
It is a well-rounded application that will definitely save you time in the long run when trying to diagnose network issues over your network.
Other worthy mentions are PRTG and ManageEngine who also have well rounded applications that do more than you would expect from a sniffing tool.
The other tools that we have looked at all perform well as sniffing tools but if you are looking for advanced alerting and monitoring features then you would be better served looking at the first three apps that we looked at today.