O'Reilly logo

Wireshark Network Security by Piyush Verma

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Analyzing Threats to LAN Security

 

"Knowing yourself is the beginning of all wisdom"

 
 --Aristotle

Having a crystal clear picture of what flows through our network is significant to understanding any suspicious traffic traversing the wire. In simple words, we should be able to distinguish between good and bad traffic. Baselining good traffic is an important step in this direction and can significantly reduce the effort required for threat analysis. In this chapter, we will go over threats to LAN security and how we can use Wireshark to analyze them. We will also solve a real-world Capture The Flag (CTF) challenge at the end.

LAN is our own kingdom, and we, the soldiers of this kingdom, are obligated to maintain a nonhostile environment. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required