O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Mastering Wireshark 2.6

Video Description


About This Video

  • Complete Wireshark coverage, ranging from troubleshooting to analysis to protocol development
  • Configure Wireshark to identify intrusive attacks and master the best ways to tackle flooding attacks
  • Intensive coverage on various cyber attacks topics and ways to secure the network

In Detail

Wireshark is the world's foremost and most widely-used network protocol analyzer. It lets you see what's happening on your network at a microscopic level. Wireshark deals with the second to the seventh layers of network protocols, and the analysis made is presented in a human-readable form. It is used for network troubleshooting, analysis, software, and communications protocol development.

This course starts setting up a Wireshark lab in the Windows and Linux operating systems. We dive into the overall process of packet capturing and Wireshark filters. Then, we introduce tshark, a command line-version of Wireshark, and we learn about various tshark commands. Later, we are introduced to various types of network cyber attack and essential remedies. We also go through an array of techniques to monitor and secure these attacks using Wireshark. Lastly, we cover network troubleshooting using Wireshark.

Towards the end of the course, you'll use Wireshark efficiently to find primary sources of network performance problems and also different ways to secure networks.

Downloading the example code for this course: You can download the example code files for all Packt video courses you have purchased from your account at http://www.PacktPub.com. If you purchased this course elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.

Table of Contents

  1. Chapter 1 : Wireshark Lab Setup
    1. The Course Overview 00:01:30
    2. Wireshark Course Overview 00:02:42
    3. Wireshark Installation in Windows 00:02:45
    4. Wireshark Installation in Linux 00:04:08
  2. Chapter 2 : Getting Started
    1. Traffic Capturing in Wireshark 00:03:02
    2. Saving and Exporting Packets 00:04:02
    3. Annotating and Printing Packets 00:03:12
    4. Remote Capturing Setup 00:02:16
    5. Usage of Remote Capture 00:02:20
  3. Chapter 3 : Traffic Filtering
    1. Display Filters 00:05:02
    2. Capture Filters 00:05:03
    3. Follow Streams 00:05:52
    4. Advance Filters 00:04:14
  4. Chapter 4 : Protocol Analysis
    1. UDP Analysis 00:03:31
    2. TCP Analysis 00:02:42
    3. HTTP Analysis 00:03:08
    4. DHCP Analysis 00:03:41
    5. FTP Analysis 00:04:19
    6. 802.11 Analysis 00:04:09
    7. Email Analysis 00:02:56
    8. VOIP Analysis 00:02:02
  5. Chapter 5 : Command-Line Wireshark
    1. Running Command line Wireshark 00:05:03
    2. Running Tshark (Terminal Based Wireshark) 00:04:11
    3. Running Tcpdump 00:05:04
    4. Running Dumpcap 00:05:29
  6. Chapter 6 : Monitor Cyber Attacks
    1. Monitor Dos and DDos Attack 00:07:08
    2. Monitor Port Scanning Attack 00:07:11
    3. Monitor Phishing Attack 00:04:30
    4. Monitor Web Vulnerabilities 00:05:13
    5. Monitor Encrypted Traffic 00:04:35
    6. Monitor Malware Attack 00:05:35
  7. Chapter 7 : Wireshark Troubleshooting
    1. Coloring Rules to Highlight Potential Performance 00:05:12
    2. Monitor Network Performance Using I/O Graphs 00:04:57
    3. Baseline Traffic to Tackle Network Anomalies 00:06:27
    4. Delta Time Value to Detect Latency Problems 00:05:39
    5. Analyzing and Troubleshooting Client Connectivity Issues 00:04:38
    6. Summary 00:01:57