Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Installing Wireshark; Introduction to Wireshark; Why use Wireshark?; The installation process; Troubleshooting common installation errors; A brief overview of the TCP/IP model; The layers in the TCP/IP model; Summary; Chapter 2: Introduction to Wireshark and Packet Analysis; What is Wireshark?; How Wireshark works; An introduction to packet analysis with Wireshark; How to do packet analysis; Capturing methodologies; Hub-based networks; The switched environment; ARP poisoning.
Text of Note
How it worksThe DHCP; The TFTP; Unusual UDP traffic; Summary; Chapter 6: Network Security Packet Analysis; Information gathering; PING sweep; Half-open scan (SYN); OS fingerprinting; ARP poisoning; Analysing brute force attacks; Inspecting malicious traffic (malware); Summary; Chapter 7: Analyzing Traffic in Thin Air; Understanding IEEE 802.11; Various modes in wireless communications; Usual and unusual wireless traffic; WPA Enterprise; Decrypting wireless network traffic; Summary; Chapter 8: Mastering the Advanced Features of Wireshark; The Statistics menu; Using the Statistics menu.
Text of Note
How request/response worksRequest; Response; Simple Mail Transfer Protocol (SMTP); Dissecting SMTP communication packets; Session Initiation Protocol (SIP) and Voice Over Internet Protocol(VOIP); Reassembling packets for playback; Decrypting encrypted traffic (SSL/TLS); Summary; Chapter 5: Analyzing the Transport Layer Protocols TCP/UDP; The transmission control protocol; Understanding the TCP header and its various flags; How TCP communicates; How it works; How sequence numbers are generated and managed; RST (reset) packets; Unusual TCP traffic; The User Datagram Protocol; The UDP header.
Text of Note
Passing through routersThe Wireshark GUI; Starting our first capture; Summary; Chapter 3: Filtering Our Way in Wireshark; Introducing filters; Capture filters; Why use capture filters; How to use capture filters; An example capture filter; Display filters; Retaining filters for later use; Colorize traffic; Create new Wireshark profiles; Summary; Chapter 4: Analyzing Application Layer Protocols; Domain Name System (DNS); Dissecting a DNS packet; Dissecting DNS query/response; File transfer protocol; Dissecting FTP communication packets; Hypertext Transfer Protocol (HTTP).
Text of Note
Protocol HierarchyConversations; Endpoints; Follow TCP Streams; Command line-fu; Summary; Other Books You May Enjoy; Index.
0
8
8
8
8
SUMMARY OR ABSTRACT
Text of Note
Wireshark is a powerful tool for network analysis, a combination of Kali Linux and the Metasploit framework. Wireshark is used to analyze the amount of data that flows through a network - it lets you see what's going on in your network. This book takes you from the basics of the Wireshark environment to detecting and resolving network anomalies.
ACQUISITION INFORMATION NOTE
Source for Acquisition/Subscription Address
01201872
Stock Number
B10983
OTHER EDITION IN ANOTHER MEDIUM
Title
Wireshark 2 Quick Start Guide : Secure Your Network Through Protocol Analysis.