© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2023
K. CardwellTactical Wiresharkhttps://doi.org/10.1007/978-1-4842-9291-4_6

6. Advanced Features of Wireshark

Kevin Cardwell1  
(1)
California, CA, USA
 

In this chapter, we will review the capabilities of Wireshark that are in the Advanced features category and as such not referenced in many of the different documents on Wireshark. We will review the Kerberos protocol communication in more detail. Following this, we will review dissectors that allow us to extract different types of network traffic.

Working with Cryptographic Information in a Packet

Thus far in the book, we have looked at multiple examples of encrypted data and how we can deal with the challenge of ...

Get Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.