O'Reilly logo

Mastering Wireshark by Charit Mishra

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Network Security Analysis

This chapter will teach you how to use Wireshark to analyze network security issues, such as analyzing malware traffic and foot printing attempts. You will learn how to use Wireshark for network security analysis. This chapter will cover the following topics:

  • Analyzing port scanning, foot printing, and attack activities
  • Lab up—port scanning with Nmap
  • Analyzing brute force attacks
  • Lab up—analyzing brute force attacks
  • Inspecting malicious traffic
  • Lab up—inspecting malicious traffic
  • Solving real-world CTF challenges
  • Practice questions

Up to this chapter, I have tried to make you aware of how one should use Wireshark to analyze the packets flowing around. We have just focused on how to use this sniffing tool for basic ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required