O'Reilly logo

Wireshark Network Security by Piyush Verma

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Probing E-mail Communications

Messages have been exchanged since centuries; however, the means to exchange these messages have evolved, and privacy has become a bigger and more important concern than ever before. From the time when messengers were used to deliver messages physically to the recent times when the Internet is used to deliver messages, the vulnerabilities have existed and are not completely fixed, even today. In this chapter, we will look at a contemporary way of messaging, that is e-mails, and the security threats it brings to the table.

In this chapter we will learn the following:

  • How to use Wireshark to detect numerous attacks on SMTP
  • Solve SMTP forensics challenges using Wireshark and a bit of Python
  • Important filters to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required