Wireshark 2 Quick Start Guide : Secure Your Network Through Protocol Analysis.
Material type:
- text
- computer
- online resource
- 9781789346718
- TK5105.3 .M574 2018
Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Installing Wireshark -- Introduction to Wireshark -- Why use Wireshark? -- The installation process -- Troubleshooting common installation errors -- A brief overview of the TCP/IP model -- The layers in the TCP/IP model -- Summary -- Chapter 2: Introduction to Wireshark and Packet Analysis -- What is Wireshark? -- How Wireshark works -- An introduction to packet analysis with Wireshark -- How to do packet analysis -- Capturing methodologies -- Hub-based networks -- The switched environment -- ARP poisoning -- Passing through routers -- The Wireshark GUI -- Starting our first capture -- Summary -- Chapter 3: Filtering Our Way in Wireshark -- Introducing filters -- Capture filters -- Why use capture filters -- How to use capture filters -- An example capture filter -- Display filters -- Retaining filters for later use -- Colorize traffic -- Create new Wireshark profiles -- Summary -- Chapter 4: Analyzing Application Layer Protocols -- Domain Name System (DNS) -- Dissecting a DNS packet -- Dissecting DNS query/response -- File transfer protocol -- Dissecting FTP communication packets -- Hypertext Transfer Protocol (HTTP) -- How request/response works -- Request -- Response -- Simple Mail Transfer Protocol (SMTP) -- Dissecting SMTP communication packets -- Session Initiation Protocol (SIP) and Voice Over Internet Protocol(VOIP) -- Reassembling packets for playback -- Decrypting encrypted traffic (SSL/TLS) -- Summary -- Chapter 5: Analyzing the Transport Layer Protocols TCP/UDP -- The transmission control protocol -- Understanding the TCP header and its various flags -- How TCP communicates -- How it works -- How sequence numbers are generated and managed -- RST (reset) packets -- Unusual TCP traffic -- The User Datagram Protocol.
The UDP header -- How it works -- The DHCP -- The TFTP -- Unusual UDP traffic -- Summary -- Chapter 6: Network Security Packet Analysis -- Information gathering -- PING sweep -- Half-open scan (SYN) -- OS fingerprinting -- ARP poisoning -- Analysing brute force attacks -- Inspecting malicious traffic (malware) -- Summary -- Chapter 7: Analyzing Traffic in Thin Air -- Understanding IEEE 802.11 -- Various modes in wireless communications -- Usual and unusual wireless traffic -- WPA Enterprise -- Decrypting wireless network traffic -- Summary -- Chapter 8: Mastering the Advanced Features of Wireshark -- The Statistics menu -- Using the Statistics menu -- Protocol Hierarchy -- Conversations -- Endpoints -- Follow TCP Streams -- Command line-fu -- Summary -- Other Books You May Enjoy -- Index.
Wireshark is a powerful tool for network analysis, a combination of Kali Linux and the Metasploit framework. Wireshark is used to analyze the amount of data that flows through a network - it lets you see what's going on in your network. This book takes you from the basics of the Wireshark environment to detecting and resolving network anomalies.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.