Difference between revisions of "Xplico"
Jump to navigation
Jump to search
Onnowpurbo (talk | contribs) |
Onnowpurbo (talk | contribs) |
||
Line 13: | Line 13: | ||
* https://github.com/Security-Onion-Solutions/ | * https://github.com/Security-Onion-Solutions/ | ||
* https://github.com/Security-Onion-Solutions/security-onion/wiki/Xplico | * https://github.com/Security-Onion-Solutions/security-onion/wiki/Xplico | ||
− | * http://zer0byte.com/2012/08/09/network-analysis-wireshark-xplico/ | + | * http://zer0byte.com/2012/08/09/network-analysis-wireshark-xplico |
− | + | * https://codingsec.net/2016/04/xplico-penetration-testing-tools-kali-linux/ | |
==Pranala Menarik== | ==Pranala Menarik== | ||
* [[xplico: network analysis wireshark xplico]] | * [[xplico: network analysis wireshark xplico]] |
Revision as of 08:08, 27 March 2017
The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isn’t a network protocol analyzer. Xplico is an open source Network Forensic Analysis Tool (NFAT).
The default admin username and password are:
username: admin password: xplico
Referensi
- http://www.xplico.org
- http://www.xplico.org/screenshot
- https://github.com/Security-Onion-Solutions/
- https://github.com/Security-Onion-Solutions/security-onion/wiki/Xplico
- http://zer0byte.com/2012/08/09/network-analysis-wireshark-xplico
- https://codingsec.net/2016/04/xplico-penetration-testing-tools-kali-linux/