A tool (hardware or software) used to capture and analyze signals and data traffic over a communication channel that uses a standard communication protocol.
Packet Analyzer:
Also known as a packet sniffer. A computer program or piece of computer hardware that can intercept and log traffic that passes over a network.
Packet Capture:
The process of intercepting and logging packet traffic with a packet analyzer.
Examples:
Wireshark
A free and open source packet (and protocol) analyzer used for network troubleshooting, analysis, software and communications protocol development, and education.
Wireshark is cross-platform, using the Qt widget toolkit in current releases to implement its user interface, and using pcap to capture packets; it runs on Linux, macOS, BSD, Solaris, some other Unix-like operating systems, and Microsoft Windows.
A command-line oriented TCP/IP packet assembler/analyzer.
The interface is inspired to the ping(8) unix command, but hping isn’t only able to send ICMP echo requests.
It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.
While hping was mainly used as a security tool in the past, it can be used in many ways by people that don’t care about security to test networks and hosts. A subset of the stuff you can do using hping:
Firewall testing
Advanced port scanning
Network testing, using different protocols, TOS, fragmentation
Manual path MTU discovery
Advanced traceroute, under all the supported protocols
Remote OS fingerprinting
Remote uptime guessing
TCP/IP stacks auditing
hping can also be useful to students that are learning TCP/IP.
Secure Capture in Python. A packet manipulation tool for computer networks, written in Python by Philippe Biondi.
It can forge or decode packets, send them on the wire, capture them, and match requests and replies. It can also handle tasks like scanning, tracerouting, probing, unit tests, attacks, and network discovery.