Andrew Crouthamel, "Mastering Wireshark 2: Develop skills for network analysis and address a wide range of information security threats"
English | 2018 | pages: 326 | ISBN: 1788626524 | EPUB | 55,0 mb
English | 2018 | pages: 326 | ISBN: 1788626524 | EPUB | 55,0 mb
Use Wireshark 2 to overcome real-world network problems
Key Features
- Delve into the core functionalities of the latest version of Wireshark
- Master network security skills with Wireshark 2
- Learn how to detect the root cause of network-related issues
Book Description
Wireshark, a combination of a Linux distro (Kali) and an open source security framework (Metasploit), is a popular and powerful tool mainly used to analyze the bits and bytes that flow through a network. It efficiently deals with the different layers of network protocols, from the second through to the seventh layer, and the analysis is presented in an easy-to-read form.
This book helps you gain the expertise you need to effectively secure your network. You'll start by installing and setting up Wireshark2.0, and then move on to exploring its interface to understand all its functionalities. Next, you will discover different ways to create, use, capture, and display filters. As you progress, you will master Wireshark's features, analyze different layers of the network protocol, and search for anomalies. The book will even guide you through the plugins and APIs in depth. Finally, you'll focus on packet analysis for security tasks, command-line utilities, and tools that manage trace files.
By the end of this book, you'll be equipped with the skills you need to use Wireshark for network security analysis, and configure it for troubleshooting purposes.
What you will learn
- Understand what network and protocol analysis is and how it can help you
- Use Wireshark to capture packets in your network
- Filter the captured traffic to only display what you need
- Explore useful statistics displays to make it easier to diagnose issues
- Customize Wireshark to your own specifications
- Analyze common network and network application protocols
Who This Book Is For
If you are a security professional or anyone interested in understanding the internal working of networks, then this book is for you. Some knowledge of using Wireshark is required to make the most out of this book.
Table of Contents
- Installing Wireshark 2
- Capturing Traffic
- Filtering Traffic
- Customizing Wireshark
- Statistics
- Introductory Analysis
- Network Protocol Analysis
- Application Protocol Analysis I
- Application Protocol Analysis II
- Command Line Tools
- Troubleshooting Scenario
My Link