April 2013
Intermediate to advanced
68 pages
1h 32m
English
In this recipe you will learn how to identify well-known network attacks. Some of these attacks can have serious consequences in environments that do not implement appropriate countermeasures. We'll see how, with some skill with Tshark and by applying the correct filters, we can detect most of these attacks.
The examples that follow show how to detect some network attacks (internal and external) using just Tshark from the command line.
bmerino@Mordor:~$ ...