Skip to main content
Glama
PreistlyPython

Wireshark MCP Server

test_results_summary.md2.88 kB
# Wireshark MCP Tools Test Results Summary ## 🎉 Test Results: 10/18 Tools Successfully Tested ### ✅ Successfully Tested Tools (10) 1. **wireshark_system_info** - ✅ Working - Returns server info, capabilities, and network interfaces 2. **wireshark_validate_setup** - ✅ Working - Validates Wireshark installation and dependencies 3. **wireshark_generate_filter** - ✅ Working - Generates Wireshark filters from natural language - Tested: "Show me all HTTP traffic on port 80 or 443" 4. **wireshark_live_capture** - ✅ Working - Captures live traffic with intelligent filtering - Uses tcpdump fallback for permission issues 5. **wireshark_protocol_statistics** - ✅ Working - Generates comprehensive protocol statistics - Tested on merged PCAP file 6. **wireshark_pcap_splitter** - ✅ Working - Successfully split PCAP file by packets - Created individual packet files 7. **wireshark_pcap_merger** - ✅ Working - Successfully merged multiple PCAP files - Maintains chronological order 8. **wireshark_hex_to_pcap** - ✅ Working - Converts hex dumps to PCAP format - Tested with both inline hex and file input 9. **wireshark_threat_detector** - ✅ Working - Performs comprehensive threat analysis - Returns anomaly detection and risk scoring 10. **wireshark_http_analyzer** - ✅ Working - Analyzes HTTP traffic patterns - Extracts transactions and security info ### ⏳ Not Yet Tested (8) 5. **wireshark_analyze_pcap** - Pending 6. **wireshark_realtime_json_capture** - Pending 8. **wireshark_analyze_pcap_enhanced** - Pending 9. **wireshark_pcap_time_slice** - Pending 14. **wireshark_dns_analyzer** - Pending 15. **wireshark_ssl_inspector** - Pending 16. **wireshark_latency_profiler** - Pending 18. **wireshark_remote_capture** - Pending ## Key Findings 1. **Configuration Issue**: The MCP server configuration was pointing to the wrong Python file (`wireshark_mcp_complete.py` instead of `enhanced_server.py`). This has been fixed. 2. **Tools Availability**: While the system info tool reports only 9 tools, testing confirms that at least 10 of the 18 tools are functional and callable through the MCP interface. 3. **Permission Handling**: The tools handle permission issues gracefully, using fallback methods (e.g., tcpdump when tshark fails). 4. **File Creation**: Tools successfully create and manipulate PCAP files in `/tmp/` directory. ## Next Steps To complete testing: 1. Test the remaining 8 tools 2. Verify all tools show up in system info after server restart 3. Create more comprehensive test cases with real network traffic ## Test Files Created - `/tmp/test_hex.pcap` - Created from hex dump - `/tmp/split_test_hex_00000_20250812124848.pcap` - Split file - `/tmp/merged_test.pcap` - Merged PCAP file - `/tmp/http_test.pcap` - HTTP traffic test file

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/PreistlyPython/wireshark-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server