From 9094978529fb97fe0d050397c6f006153c784a37 Mon Sep 17 00:00:00 2001 From: Mihirraj Dixit <33447734+MihirrajDixit@users.noreply.github.com> Date: Mon, 22 Oct 2018 00:00:01 +0530 Subject: [PATCH] Fix(guide): Add ways to filter packets with tools --- guide/english/security/packet-filtering/index.md | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/guide/english/security/packet-filtering/index.md b/guide/english/security/packet-filtering/index.md index fc59a2aaa1..4421eab8fb 100644 --- a/guide/english/security/packet-filtering/index.md +++ b/guide/english/security/packet-filtering/index.md @@ -11,3 +11,8 @@ Network layer firewalls define packet filtering rule sets, which provide highly ### Filtering Methods There are three ways in which a packet filter can be configured, once the set of filtering rules has been defined. In the first method, the filter accepts only those packets that it is certain are safe, dropping all others. This is the most secure mode, but it can cause inconvenience if legitimate packets are inadvertently dropped. In the second method, the filter drops only the packets that it is certain are unsafe, accepting all others. This mode is the least secure, but is causes less inconvenience, particularly in casual Web browsing. In the third method, if the filter encounters a packet for which its rules do not provide instructions, that packet can be quarantined, or the user can be specifically queried concerning what should be done with it. This can be inconvenient if it causes numerous dialog boxes to appear, for example, during Web browsing. + +## Various ways to do packet filtering +1) The user can sniff through the packet via wireshark tool and filter the packets. +2) Packets can also be filtered using the netfilter queue library in python. +3) One can use scapy or pyshark python library or tshark tool to filter out packets.