In this chapter, we will review the capabilities of Wireshark that are in the Advanced features category and as such not referenced in many of the different documents on Wireshark. We will review the Kerberos protocol communication in more detail. Following this, we will review dissectors that allow us to extract different types of network traffic.
6. Advanced Features of Wireshark
Get Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.