This is our old Q&A Site. Please post any new questions and answers at ask.wireshark.org.

Hi, there! I am quite curious about WireShark, and as an experiment, I have programmed a simple application which contacts a specific website, and outputs the contents of that website.

My goal is to see if it is possible to use wireshark to:

  1. Detect that my app (or any app at all, no need for specificity, only my app will visit this page) is contacting the specific webpage
  2. Stop the connection
  3. Send back false data, making my app think that the website returned something that it didn't

Is this possible at all, and if so, how might I do it?

Thankyou! :)

P.S. for clarity, yes, I am looking to specifically intercept and falsify HTTP data transfer to and from a very specific URI on a very specific URL.

asked 09 Jun '12, 23:11

Flynn's gravatar image

Flynn
6112
accept rate: 0%


P.S. for clarity, yes, I am looking to specifically intercept and falsify HTTP data transfer to and from a very specific URI on a very specific URL.

Wireshark is a passive monitoring tool. It can only read (and analyze) data from the network. There is no option to send data. So, there is no way to do what you want (changing data on the fly).

A transparent proxy can do that. Please google it.

Regards
Kurt

permanent link

answered 10 Jun '12, 00:31

Kurt%20Knochner's gravatar image

Kurt Knochner ♦
24.8k1039237
accept rate: 15%

edited 10 Jun '12, 00:43

Your answer
toggle preview

Follow this question

By Email:

Once you sign in you will be able to subscribe for any updates here

By RSS:

Answers

Answers and Comments

Markdown Basics

  • *italic* or _italic_
  • **bold** or __bold__
  • link:[text](http://url.com/ "title")
  • image?![alt text](/path/img.jpg "title")
  • numbered list: 1. Foo 2. Bar
  • to add a line break simply add two spaces to where you would like the new line to be.
  • basic HTML tags are also supported

Question tags:

×1,620
×293
×5

question asked: 09 Jun '12, 23:11

question was seen: 3,639 times

last updated: 10 Jun '12, 00:43

p​o​w​e​r​e​d by O​S​Q​A