<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Khang Nguyen Huynh</title>
    <description>The latest articles on DEV Community by Khang Nguyen Huynh (@khuynh22).</description>
    <link>https://dev.to/khuynh22</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3600596%2F0dfc96db-fc8b-4dc4-a4b2-d820c738e278.jpeg</url>
      <title>DEV Community: Khang Nguyen Huynh</title>
      <link>https://dev.to/khuynh22</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/khuynh22"/>
    <language>en</language>
    <item>
      <title>Analyzing Network Traffic with AI: Introducing mcp-wireshark (Wireshark + MCP)</title>
      <dc:creator>Khang Nguyen Huynh</dc:creator>
      <pubDate>Fri, 07 Nov 2025 07:57:45 +0000</pubDate>
      <link>https://dev.to/khuynh22/analyzing-network-traffic-with-ai-introducing-mcp-wireshark-wireshark-mcp-3gl4</link>
      <guid>https://dev.to/khuynh22/analyzing-network-traffic-with-ai-introducing-mcp-wireshark-wireshark-mcp-3gl4</guid>
      <description>&lt;p&gt;🚀 &lt;strong&gt;New Release: mcp-wireshark - Wireshark for the AI Era!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I'm excited to announce the initial release of &lt;strong&gt;mcp-wireshark&lt;/strong&gt;, a Python-based Model Context Protocol (MCP) server that seamlessly integrates &lt;strong&gt;Wireshark/tshark&lt;/strong&gt; with modern &lt;strong&gt;AI tools&lt;/strong&gt; (like Claude Desktop) and &lt;strong&gt;IDEs&lt;/strong&gt; (like VS Code)!&lt;/p&gt;

&lt;p&gt;This project turns powerful network analysis into an accessible, programmatic tool for developers, security researchers, and network engineers.&lt;/p&gt;




&lt;h3&gt;
  
  
  💡 &lt;strong&gt;What is mcp-wireshark?&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;It’s a cross-platform, typed, and testable server that lets you execute core Wireshark/tshark functions right from your favorite AI-powered client or IDE.&lt;/p&gt;

&lt;h3&gt;
  
  
  ✨ &lt;strong&gt;Key Features&lt;/strong&gt;
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;📡 Live Capture &amp;amp; PCAP Analysis:&lt;/strong&gt; Capture live traffic or parse existing &lt;code&gt;.pcap&lt;/code&gt;/&lt;code&gt;.pcapng&lt;/code&gt; files.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;🔎 Display Filters:&lt;/strong&gt; Apply powerful Wireshark display filters programmatically.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;🔗 Follow TCP Streams:&lt;/strong&gt; Extract and analyze specific TCP stream payloads.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;📊 Protocol Statistics:&lt;/strong&gt; Generate detailed protocol statistics on the fly.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;💾 JSON Export:&lt;/strong&gt; Export packet data to JSON format for easy analysis and integration.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;💻 Cross-Platform:&lt;/strong&gt; Works on macOS, Linux, and Windows.&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  🛠️ &lt;strong&gt;Installation is Quick!&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Requires Python 3.10+ and Wireshark/tshark installed on your system.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;pip &lt;span class="nb"&gt;install &lt;/span&gt;mcp-wireshark
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  🧑‍💻 Usage Examples
&lt;/h3&gt;

&lt;p&gt;You can use it via the CLI, or integrate it into Claude Desktop and VS Code via their respective MCP configuration files.&lt;/p&gt;

&lt;h4&gt;
  
  
  Example: Read 50 Packets from a PCAP
&lt;/h4&gt;

&lt;p&gt;You can prompt your AI tool to use the built-in &lt;code&gt;read_pcap&lt;/code&gt; tool:&lt;/p&gt;

&lt;p&gt;Read the first 50 packets from 'network_log.pcap'&lt;/p&gt;

&lt;h4&gt;
  
  
  Example: Capture Live Traffic
&lt;/h4&gt;

&lt;p&gt;You can use the &lt;code&gt;live_capture&lt;/code&gt; tool:&lt;/p&gt;

&lt;p&gt;Capture packets from eth0 for 60 seconds with filter "tcp.port == 80"&lt;/p&gt;

&lt;p&gt;🔗 Helpful Links&lt;br&gt;
GitHub Repository: &lt;a href="https://github.com/khuynh22/mcp-wireshark" rel="noopener noreferrer"&gt;https://github.com/khuynh22/mcp-wireshark&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;PyPI: &lt;a href="https://pypi.org/project/mcp-wireshark/" rel="noopener noreferrer"&gt;https://pypi.org/project/mcp-wireshark/&lt;/a&gt;&lt;br&gt;
Give it a try and let me know what you think! All feedback, bug reports, and contributions are welcome. If you find it helpful, please leave a star.&lt;/p&gt;

</description>
      <category>python</category>
      <category>mcp</category>
      <category>ai</category>
      <category>wireshark</category>
    </item>
  </channel>
</rss>
