Packet Analysis with Wireshark

Nonfiction, Computers, Networking & Communications, Network Protocols
Cover of the book Packet Analysis with Wireshark by Anish Nath, Packt Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Anish Nath ISBN: 9781785885846
Publisher: Packt Publishing Publication: July 25, 2016
Imprint: Packt Publishing Language: English
Author: Anish Nath
ISBN: 9781785885846
Publisher: Packt Publishing
Publication: July 25, 2016
Imprint: Packt Publishing
Language: English

Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis

About This Book

  • Gain hands-on experience of troubleshooting errors in TCP/IP and SSL protocols through practical use cases
  • Identify and overcome security flaws in your network to get a deeper insight into security analysis
  • This is a fast-paced book that focuses on quick and effective packet captures through practical examples and exercises

Who This Book Is For

If you are a network or system administrator who wants to effectively capture packets, a security consultant who wants to audit packet flows, or a white hat hacker who wants to view sensitive information and remediate it, this book is for you. This book requires decoding skills and a basic understanding of networking.

What You Will Learn

  • Utilize Wireshark's advanced features to analyze packet captures
  • Locate the vulnerabilities in an application server
  • Get to know more about protocols such as DHCPv6, DHCP, DNS, SNMP, and HTTP with Wireshark
  • Capture network packets with tcpdump and snoop with examples
  • Find out about security aspects such as OS-level ARP scanning
  • Set up 802.11 WLAN captures and discover more about the WAN protocol
  • Enhance your troubleshooting skills by understanding practical TCP/IP handshake and state diagrams

In Detail

Wireshark provides a very useful way to decode an RFC and examine it. The packet captures displayed in Wireshark give you an insight into the security and flaws of different protocols, which will help you perform the security research and protocol debugging.

The book starts by introducing you to various packet analyzers and helping you find out which one best suits your needs. You will learn how to use the command line and the Wireshark GUI to capture packets by employing filters. Moving on, you will acquire knowledge about TCP/IP communication and its use cases. You will then get an understanding of the SSL/TLS flow with Wireshark and tackle the associated problems with it. Next, you will perform analysis on application-related protocols. We follow this with some best practices to analyze wireless traffic. By the end of the book, you will have developed the skills needed for you to identify packets for malicious attacks, intrusions, and other malware attacks.

Style and approach

This is an easy-to-follow guide packed with illustrations and equipped with lab exercises to help you reproduce scenarios using a sample program and command lines.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis

About This Book

Who This Book Is For

If you are a network or system administrator who wants to effectively capture packets, a security consultant who wants to audit packet flows, or a white hat hacker who wants to view sensitive information and remediate it, this book is for you. This book requires decoding skills and a basic understanding of networking.

What You Will Learn

In Detail

Wireshark provides a very useful way to decode an RFC and examine it. The packet captures displayed in Wireshark give you an insight into the security and flaws of different protocols, which will help you perform the security research and protocol debugging.

The book starts by introducing you to various packet analyzers and helping you find out which one best suits your needs. You will learn how to use the command line and the Wireshark GUI to capture packets by employing filters. Moving on, you will acquire knowledge about TCP/IP communication and its use cases. You will then get an understanding of the SSL/TLS flow with Wireshark and tackle the associated problems with it. Next, you will perform analysis on application-related protocols. We follow this with some best practices to analyze wireless traffic. By the end of the book, you will have developed the skills needed for you to identify packets for malicious attacks, intrusions, and other malware attacks.

Style and approach

This is an easy-to-follow guide packed with illustrations and equipped with lab exercises to help you reproduce scenarios using a sample program and command lines.

More books from Packt Publishing

Cover of the book Moodle 1.9 Testing and Assessment by Anish Nath
Cover of the book JBoss AS 7 Configuration, Deployment and Administration by Anish Nath
Cover of the book Instant AppFog by Anish Nath
Cover of the book Alfresco One 5.x Developer's Guide - Second Edition by Anish Nath
Cover of the book SQL Server 2012 with PowerShell V3 Cookbook by Anish Nath
Cover of the book Mastering Social Media Mining with R by Anish Nath
Cover of the book RavenDB 2.x Beginners Guide by Anish Nath
Cover of the book Microsoft SQL Azure Enterprise Application Development by Anish Nath
Cover of the book Exploring SE for Android by Anish Nath
Cover of the book Firebug 1.5: Editing, Debugging, and Monitoring Web Pages by Anish Nath
Cover of the book Learning Android Canvas by Anish Nath
Cover of the book Apache Solr for Indexing Data by Anish Nath
Cover of the book Troubleshooting Citrix XenDesktop® by Anish Nath
Cover of the book Securing Hadoop by Anish Nath
Cover of the book Do more with SOA Integration: Best of Packt by Anish Nath
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy