Firefox 브라우저 부가 기능
  • 확장 기능
  • 테마
    • Firefox용
    • 사전 및 언어 팩
    • 다른 브라우저 사이트
    • Android 부가 기능
로그인
Wireshark Network Threat Forensics 미리보기

Wireshark Network Threat Forensics 제작자: Libor Benes (Dr. B)

3,100 Wireshark display filters for threat hunting, malware C2/beaconing detection, intrusion analysis, exfiltration, lateral movement, credential abuse, and network forensics. • Real-time search. • Fully offline. No Data Collection.

0 (리뷰 0개)0 (리뷰 0개)
사용자 5명사용자 5명
Firefox를 다운로드하고 확장 기능을 받으세요
파일 다운로드

확장 메타 데이터

정보
Wireshark Network Threat Forensics is a security-first, offline Firefox sidebar extension that delivers instant, searchable access to 3,100 carefully curated Wireshark display filters — a unique (albeit logically non-exhaustive) collection focused on real-world network threat detection and digital forensics.

With the signature, hallmark architecture prioritizing the security-first approach, all processing and data are client-side — no telemetry, no network requests, no data collection.

During incident response, malware analysis, threat hunting, red-team/blue-team exercises, and forensic investigations, security professionals need rapid access to proven display filters capable of identifying command-and-control (C2) beaconing, data exfiltration, lateral movement, credential harvesting, ransomware precursors, port scans, MITM attempts, protocol abuse, and many other malicious behaviors.

This extension provides exactly that — a comprehensive, categorized reference of the most effective and up-to-date display filters, drawn from official Wireshark documentation, public cheat sheets, SANS posters, malware traffic analysis reports (Unit 42, Mandiant, Black Hills, etc.), and current 2025–2026 threat intelligence observations.

Purpose:
Rapid, searchable reference for Wireshark display filters — ideal for real-time packet analysis, threat hunting, incident response, malware traffic analysis, red-team/blue-team exercises, and forensic investigations.

About Wireshark:
Wireshark, originally authored as Ethereal in 1998 by Gerald Combs (a computer science graduate of the University of Missouri–Kansas City), is the world's leading open-source network protocol analyzer. It supports two distinct types of filters:
• Capture filters — applied during live capture using BPF syntax (e.g. tcp port 80), used to reduce the volume of recorded traffic.
• Display filters — applied after capture to filter, highlight, and analyze already-recorded packets using Wireshark's own powerful expression language (e.g. http.request.method == "POST" && http.request.uri contains "login").

This extension contains exclusively display filters — the far more expressive, flexible, and forensics-oriented type used for deep inspection of PCAP files or live sessions. It does not include capture filters, which are simpler and far less numerous.

Target Audience:
• Network Security Analysts & Threat Hunters.
• Incident Responders & DFIR Practitioners.
• Malware Reverse Engineers.
• Red Team / Penetration Testers.
• Blue Team / SOC Analysts.
• Forensic Investigators.
• Bug Bounty Hunters.
• Students & Educators in network security.

Key Categories Include:
• Frame & General
• Ethernet / Link Layer
• IP / ICMP / ICMPv6
• TCP Basics & Flags
• TCP Analysis & Errors
• UDP
• DNS (tunneling, DGA, exfil)
• HTTP / HTTPS / TLS (client hints, weak ciphers, downgrade)
• Suspicious / Security / Anomalies (scans, MITM, DoS)
• Malware / C2 / Beaconing Indicators
• Wireless / Wi-Fi / 802.11 (deauth, PMKID, evil twin)
• SMB / Windows Protocols (NTLM, PsExec, WMI)
• Email / SMTP / IMAP / POP (phishing, credential leaks)
• VoIP / RTP / SIP (toll fraud, call spam)
• Miscellaneous / Expert / Custom (rare patterns, high-entropy, shellcode).

Features:
• Real-time dynamic smart search across category, title, filter expression, and description.
• Click-to-copy display filter string with "Copied!" visual feedback.
• Syntax-highlighted filters (monospace) + highlighted search terms (<mark>).
• Terminal-inspired design.
• Fully offline — no network requests, no data collection.
• Compact with instant performance even on 3,100 entries.

Security & Privacy:
• Only one permission: clipboardWrite (required for copy-to-clipboard).
• Zero data collection — explicitly declared in manifest.json.
• No external requests, no analytics, no telemetry.
• No third-party libraries — 100% first-party code.
• Manifest v2 compliant with Mozilla review standards.

Technical Specifications:
• Compatibility: Firefox 109.0+ (64-bit desktop).
• Size: ~532 KB total (minimal memory footprint).
• Performance: Instant filtering on 3,100 entries.
• Tested on: Firefox 147.0.3 (February 2026).

Wireshark Network Threat Forensics brings a unique, powerful, comprehensive, security-first collection of display filters directly into your Firefox sidebar — ready for immediate use in threat hunting and forensic workflows, with complete offline privacy protection.

Happy network threat hunting — stay safe, stay offline.
0명이 0점으로 평가함
로그인하여 이 확장 기능의 평점을 남겨주세요
아직 평점이 없습니다

별점 저장됨

5
0
4
0
3
0
2
0
1
0
아직 리뷰 없음
권한 및 데이터

필수 권한:

  • 클립보드에 데이터 넣기

데이터 수집:

  • 개발자가 이 확장 기능은 데이터 수집이 필요하지 않다고 합니다.
더 알아보기
추가 정보
부가 기능 링크
  • 지원 사이트
  • 지원 이메일
  • Copy add-on ID
버전
1.0
크기
150.99 KB
마지막 업데이트
3달 전 (2026년 2월 15일)
관련 카테고리
  • 웹 개발 도구
  • 개인 정보 보호 및 보안
  • 검색 도구
라이선스
Mozilla Public License 2.0
버전 목록
  • 모든 버전 보기
모음집에 추가
이 부가 기능 신고
Mozilla 홈페이지로 이동

부가 기능

  • 소개
  • Firefox 부가 기능 블로그
  • 확장 기능 워크샵
  • 개발자 허브
  • 개발자 정책
  • 커뮤니티 블로그
  • 포럼
  • 버그 신고
  • 리뷰 지침

브라우저

  • Desktop
  • Mobile
  • Enterprise

제품

  • Browsers
  • VPN
  • Relay
  • Monitor
  • Pocket
  • Bluesky (@firefox.com)
  • Instagram (Firefox)
  • YouTube (firefoxchannel)
  • 개인 정보
  • 쿠키
  • 법률

특별한 고지가 없는 한, 본 사이트의 콘텐츠는 Commons Attribution Share-Alike License v3.0 또는 그 이후 버전에 따라 사용이 허가됩니다.