© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2023
K. CardwellTactical Wiresharkhttps://doi.org/10.1007/978-1-4842-9291-4_3

3. Interpreting Network Protocols

Kevin Cardwell1  
(1)
California, CA, USA
 

Now that we know how to perform the requirements for our packet captures to include the different parameters for the communications as well as the ability to set filters on the network traffic we capture, it is time to turn our attention to the different protocols that are part of any network investigation from analysis of intrusions all the way up to collection of forensics evidence. When you think of it, all that we do on the Internet, none of this would be possible without the network protocols that drive our ...

Get Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.