Now that we know how to perform the requirements for our packet captures to include the different parameters for the communications as well as the ability to set filters on the network traffic we capture, it is time to turn our attention to the different protocols that are part of any network investigation from analysis of intrusions all the way up to collection of forensics evidence. When you think of it, all that we do on the Internet, none of this would be possible without the network protocols that drive our ...
3. Interpreting Network Protocols
Get Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.