© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2023
K. CardwellTactical Wiresharkhttps://doi.org/10.1007/978-1-4842-9291-4_5

5. Effective Network Traffic Filtering

Kevin Cardwell1  
(1)
California, CA, USA
 

In this chapter, we will review the power of the filtering capability within the Wireshark tool. You will discover that by using filters, you can extract information of an intrusion quickly and efficiently. We will explore the filters that can be used to extract data and information from our files; this includes images and any other data of interest.

Identifying Filter Components

When it comes to identifying the different types of filters within Wireshark, we have many options. The first we will explore here ...

Get Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.