Book description
A succinct guide to securely administer your network using Wireshark
In Detail
Wireshark is the world's foremost network protocol analyzer for network analysis and troubleshooting.
This book will walk you through exploring and harnessing the vast potential of Wireshark, the world's foremost network protocol analyzer.
The book begins by introducing you to the foundations of Wireshark and showing you how to browse the numerous features it provides. You'll be walked through using these features to detect and analyze the different types of attacks that can occur on a network. As you progress through the chapters of this book, you'll learn to perform sniffing on a network, analyze clear-text traffic on the wire, recognize botnet threats, and analyze Layer 2 and Layer 3 attacks along with other common hacks.
By the end of this book, you will be able to fully utilize the features of Wireshark that will help you securely administer your network.
What You Will Learn
- Familiarize yourself with the robust features offered by Wireshark
- Use the powerful command-line utilities shipped with Wireshark
- Analyze numerous threats to network security using Wireshark
- Investigate attacks performed using popular security tools such as Nmap, Nessus, Metasploit, and more
- Solve real-world CTF challenges using Wireshark
- Create your own security-related profile in Wireshark
- Configure Wireshark for effective network troubleshooting
- Get accustomed to common scenarios faced by security analysts
- Analyze malware traffic successfully by using Wireshark
- Unearth anomalies hampering the speed of network communications
Table of contents
-
Wireshark Network Security
- Table of Contents
- Wireshark Network Security
- Credits
- About the Author
- Acknowledgment
- About the Reviewers
- www.PacktPub.com
- Preface
- 1. Getting Started with Wireshark – What, Why, and How?
- 2. Tweaking Wireshark
-
3. Analyzing Threats to LAN Security
- Analyzing clear-text traffic
- Examining sniffing attacks
- Analyzing network reconnaissance techniques
- Detect password cracking attempts
- Miscellaneous attacks
- Complementary tools to Wireshark
- Important display filters
- Nailing the CTF challenge
- Summary
- 4. Probing E-mail Communications
- 5. Inspecting Malware Traffic
- 6. Network Performance Analysis
- Index
Product information
- Title: Wireshark Network Security
- Author(s):
- Release date: July 2015
- Publisher(s): Packt Publishing
- ISBN: 9781784393335
You might also like
book
Praxiswissen COBIT, 3rd Edition
COBIT (Control Objectives for Information and Related Technology) ist das führende Rahmenwerk für die Governance und …
book
Learning Go
Go is rapidly becoming the preferred language for building web services. While there are plenty of …
book
Designing Data-Intensive Applications
Data is at the center of many challenges in system design today. Difficult issues need to …
book
The Staff Engineer's Path
For years, companies have rewarded their most effective engineers with management positions. But treating management as …