Difference between revisions of "Xplico"

From OnnoWiki
Jump to navigation Jump to search
Line 13: Line 13:
 
* https://github.com/Security-Onion-Solutions/
 
* https://github.com/Security-Onion-Solutions/
 
* https://github.com/Security-Onion-Solutions/security-onion/wiki/Xplico
 
* https://github.com/Security-Onion-Solutions/security-onion/wiki/Xplico
* http://zer0byte.com/2012/08/09/network-analysis-wireshark-xplico/
+
* http://zer0byte.com/2012/08/09/network-analysis-wireshark-xplico
 
+
* https://codingsec.net/2016/04/xplico-penetration-testing-tools-kali-linux/
  
 
==Pranala Menarik==
 
==Pranala Menarik==
  
 
* [[xplico: network analysis wireshark xplico]]
 
* [[xplico: network analysis wireshark xplico]]

Revision as of 08:08, 27 March 2017

The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isn’t a network protocol analyzer. Xplico is an open source Network Forensic Analysis Tool (NFAT).


The default admin username and password are:

username: admin
password: xplico

Referensi

Pranala Menarik