Document Type
|
:
|
BL
|
Record Number
|
:
|
856661
|
Main Entry
|
:
|
Mishra, Charit.
|
Title & Author
|
:
|
Wireshark 2 Quick Start Guide : : Secure Your Network Through Protocol Analysis.
|
Publication Statement
|
:
|
Birmingham :: Packt Publishing Ltd,, 2018.
|
Page. NO
|
:
|
1 online resource (155 pages)
|
ISBN
|
:
|
1789342783
|
|
:
|
: 1789346711
|
|
:
|
: 9781789342789
|
|
:
|
: 9781789346718
|
Contents
|
:
|
Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Installing Wireshark; Introduction to Wireshark; Why use Wireshark?; The installation process; Troubleshooting common installation errors; A brief overview of the TCP/IP model; The layers in the TCP/IP model; Summary; Chapter 2: Introduction to Wireshark and Packet Analysis; What is Wireshark?; How Wireshark works; An introduction to packet analysis with Wireshark; How to do packet analysis; Capturing methodologies; Hub-based networks; The switched environment; ARP poisoning.
|
|
:
|
How it worksThe DHCP; The TFTP; Unusual UDP traffic; Summary; Chapter 6: Network Security Packet Analysis; Information gathering; PING sweep; Half-open scan (SYN); OS fingerprinting; ARP poisoning; Analysing brute force attacks; Inspecting malicious traffic (malware); Summary; Chapter 7: Analyzing Traffic in Thin Air; Understanding IEEE 802.11; Various modes in wireless communications; Usual and unusual wireless traffic; WPA Enterprise; Decrypting wireless network traffic; Summary; Chapter 8: Mastering the Advanced Features of Wireshark; The Statistics menu; Using the Statistics menu.
|
|
:
|
How request/response worksRequest; Response; Simple Mail Transfer Protocol (SMTP); Dissecting SMTP communication packets; Session Initiation Protocol (SIP) and Voice Over Internet Protocol(VOIP); Reassembling packets for playback; Decrypting encrypted traffic (SSL/TLS); Summary; Chapter 5: Analyzing the Transport Layer Protocols TCP/UDP; The transmission control protocol; Understanding the TCP header and its various flags; How TCP communicates; How it works; How sequence numbers are generated and managed; RST (reset) packets; Unusual TCP traffic; The User Datagram Protocol; The UDP header.
|
|
:
|
Passing through routersThe Wireshark GUI; Starting our first capture; Summary; Chapter 3: Filtering Our Way in Wireshark; Introducing filters; Capture filters; Why use capture filters; How to use capture filters; An example capture filter; Display filters; Retaining filters for later use; Colorize traffic; Create new Wireshark profiles; Summary; Chapter 4: Analyzing Application Layer Protocols; Domain Name System (DNS); Dissecting a DNS packet; Dissecting DNS query/response; File transfer protocol; Dissecting FTP communication packets; Hypertext Transfer Protocol (HTTP).
|
|
:
|
Protocol HierarchyConversations; Endpoints; Follow TCP Streams; Command line-fu; Summary; Other Books You May Enjoy; Index.
|
Abstract
|
:
|
Wireshark is a powerful tool for network analysis, a combination of Kali Linux and the Metasploit framework. Wireshark is used to analyze the amount of data that flows through a network - it lets you see what's going on in your network. This book takes you from the basics of the Wireshark environment to detecting and resolving network anomalies.
|
Subject
|
:
|
Computer network protocols.
|
Subject
|
:
|
Packet switching (Data transmission)
|
Subject
|
:
|
Computer network protocols.
|
Subject
|
:
|
Computer networking communications.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
Computers-- Networking-- General.
|
Subject
|
:
|
Computers-- Networking-- Network Protocols.
|
Subject
|
:
|
Computers-- Security-- General.
|
Subject
|
:
|
Networking standards protocols.
|
Subject
|
:
|
Packet switching (Data transmission)
|
Dewey Classification
|
:
|
004.66
|
LC Classification
|
:
|
TK5105.3.M574 2018eb
|