In this chapter, we will review the power of the filtering capability within the Wireshark tool. You will discover that by using filters, you can extract information of an intrusion quickly and efficiently. We will explore the filters that can be used to extract data and information from our files; this includes images and any other data of interest.
5. Effective Network Traffic Filtering
Get Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.