© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2023
K. CardwellTactical Wiresharkhttps://doi.org/10.1007/978-1-4842-9291-4_2

2. Capturing Network Traffic

Kevin Cardwell1  
(1)
California, CA, USA
 

In this chapter, we will review the process of capturing the network and how we use the different features of the physical or virtual network card and switch to obtain this information and then it is displayed.

Capturing Network Traffic

One of the first things we need to do when it comes to capturing our network traffic is establish how we want to capture the traffic. The network traffic that we capture is dependent on the type of network card we are wanting to capture on.

Before we get to this, let us discuss what exactly ...

Get Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.