© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2023
N. K. Nainar, A. PandaWireshark for Network Forensicshttps://doi.org/10.1007/978-1-4842-9001-9_3

3. Capturing Secured Application Traffic for Analysis

Nagendra Kumar Nainar1   and Ashish Panda2
(1)
North Carolina, NC, USA
(2)
Bangalore, Karnataka, India
 

Following the famous adage that goes “Necessity is the mother of any invention,” securing end-to-end traffic is an evolution happening for the past couple of decades in an attempt to secure the user and data privacy from malicious hackers.

Cyber-attack is ever evolving right from 1986 when the very first computer virus known to the industry, named “Brain,” was introduced infecting the boot sectors of computers. ...

Get Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.