8

Network Traffic Analysis and Eavesdropping

In the previous chapter, we learned about a network device’s memory structures, and the buffer space allocations, attacks, and countermeasures related to them. In this chapter, we will learn about the various packet analyses, tools/scripts used for packet analysis, and network-level attacks.

This chapter starts with the demonstration of common tools such as Wireshark and TCPdump that are used to perform deep packet analysis. We shall also look into some of the Linux-based scripts that help attackers and network administrators, to understand the various levels of network packets to either plan for the attacks or secure against them.

In this chapter, we will cover the following main topics:

  • Packet ...

Get Network Protocols for Security Professionals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.