2

Capturing and Analyzing Network Traffic

In Chapter 1, Networking Primer, we covered several networking activities. One that needs to be explored in more depth is the ability to capture and analyze network traffic. Having the skills to capture and analyze packets is crucial during an ethical hack. You may discover sensitive information, such as login credentials, especially when the service being used is insecure. So, let’s dive into sharpening these skills in this chapter.

In this chapter, we are going to cover the following main topics:

  • Capturing network traffic
  • Working with network traffic in the cloud
  • Putting what you have learned into practice
  • Best practices

Technical requirements

To complete this chapter, you will require the following: ...

Get Ethical Hacking Workshop now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.