Ethereal Packet Sniffing

Book description

This book provides system administrators with all of the information as well as software they need to run Ethereal Protocol Analyzer on their networks. There are currently no other books published on Ethereal, so this book will begin with chapters covering the installation and configuration of Ethereal. From there the book quickly moves into more advanced topics such as optimizing Ethereal's performance and analyzing data output by Ethereal.

Ethereal is an extremely powerful and complex product, capable of analyzing over 350 different network protocols. As such, this book also provides readers with an overview of the most common network protocols used, as well as analysis of Ethereal reports on the various protocols. The last part of the book provides readers with advanced information on using reports generated by Ethereal to both fix security holes and optimize network performance.
  • Provides insider information on how to optimize performance of Ethereal on enterprise networks.
  • Book comes with a CD containing Ethereal, Tethereal, Nessus, Snort, ACID, Barnyard, and more!
  • Includes coverage of popular command-line version, Tethereal.

Table of contents

  1. Cover
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Acknowledgments
  6. Author
  7. Contributors
  8. Technical Editor and Contributor
  9. Series Editor
  10. Technical Reviewer
  11. Foreword
  12. Chapter 1: Introducing Network Analysis
    1. Introduction
    2. What is Network Analysis and Sniffing?
    3. Who Uses Network Analysis?
    4. How Does It Work?
    5. Detecting Sniffers
    6. Protecting Against Sniffers
    7. Network Analysis and Policy
    8. Summary
    9. Solutions Fast Track
  13. Chapter 2: Introducing Ethereal: Network Protocol Analyzer
    1. Introduction
    2. What is Ethereal?
    3. Supporting Programs
    4. Using Ethereal in Your Network Architecture
    5. Using Ethereal for Network Troubleshooting
    6. Summary
    7. Solutions Fast Track
  14. Chapter 3: Getting and Installing Ethereal
    1. Introduction
    2. Getting Ethereal
    3. Packet Capture Drivers
    4. Installing Ethereal on Windows
    5. Installing Ethereal on UNIX
    6. Building Ethereal from Source
    7. Summary
    8. Solutions Fast Track
  15. Chapter 4: Using Ethereal
    1. Introduction
    2. Getting Started with Ethereal
    3. Exploring the Main Window
    4. Other Window Components
    5. Exploring the Menus
    6. Using Command Line Options
    7. Summary
    8. Solutions Fast Track
  16. Chapter 5: Filters
    1. Introduction
    2. Writing Capture Filters
    3. Writing Display Filters
    4. Summary
    5. Solutions Fast Track
  17. Chapter 6: Other Programs Packaged with Ethereal
    1. Introduction
    2. Tethereal
    3. Editcap
    4. Mergecap
    5. Text2pcap
    6. Summary
    7. Solutions Fast Track
  18. Chapter 7: Integrating Ethereal with Other Sniffers
    1. Introduction
    2. Reading Capture Files with Ethereal
    3. Saving Capture Files with Ethereal
    4. Ethereal Integration
    5. Summary
    6. Solutions Fast Track
  19. Chapter 8: Real World Packet Captures
    1. Introduction
    2. Scanning
    3. Remote Access Trojans
    4. Dissecting Worms
    5. Summary
    6. Solutions Fast Track
  20. Chapter 9: Developing Ethereal
    1. Introduction
    2. Prerequisites for Developing Ethereal
    3. Ethereal Design
    4. Developing a Dissector
    5. Advanced Topics
    6. Summary
    7. Solutions Fast Track
  21. Appendix: Supported Protocols
  22. About the CD
  23. Index

Product information

  • Title: Ethereal Packet Sniffing
  • Author(s): Syngress
  • Release date: February 2004
  • Publisher(s): Syngress
  • ISBN: 9780080477664