Skip to content
Nirmal Lankathilaka edited this page Dec 13, 2014 · 6 revisions

Welcome to the Shark wiki! Here are some resources to help you get started.

Philosophy

WireShark does exist.

But does that mean there's no place for innovation? While WireShark is complete and very advanced, it lacks one thing: ease for security-specific general usages.

If a person wishes to track down a specific person's encripted credentials flowing in a huge random vat of packets, well, WireShark is capable of giving you the answer. But the problem lies in the amount of work needed to uncover that packet. This is a very general user scenario and one may fairly wonder why it's so difficult.

Shark wishes to fill that gap, in the long run. It begins life as a very simple packet details analyzer but plans for a much more efficient and optimized packet capturing and processing abilities to expose a powerfull API for (1st party & 3rd party) plug-ins for security-related goals.

Current Status

  • The codebase is somewhat jumbled. It needs refactoring for a much better and efficient design.

  • Live capturing is buggy on non-Windows systems; also needs a more intuitive design.

  • Extracted details are limited, which limits Filtering to very basic criterias.

  • Statistics are very basic. Will have much more useful and graphical information in the future.

  • Both live-capturing and processing pre-captured files are blocking. It needs a better design.

  • No pre-built files. Needs packaging.

These are the basic points that define the current status of the project and future goals. The free software community is welcome to share your ideas and develop this into something powerful and useful.

:-)

Shark

Capturing, analyzing and extraction of security related data from packets in live-traffic.

#betterShark on Twitter

Clone this wiki locally