封面
版权信息
Credits
About the Author
Acknowledgment
About the Reviewers
www.PacktPub.com
Preface
Chapter 1. Getting Started with Wireshark – What Why and How?
Sniffing
The tools of the trade
What is Wireshark?
The Wireshark interface – Before starting the capture
First packet capture
Summary
Chapter 2. Tweaking Wireshark
Filtering our way through Wireshark
Wireshark profiles
Essential techniques in Wireshark
Wireshark command-line fu
Summary
Chapter 3. Analyzing Threats to LAN Security
Analyzing clear-text traffic
Examining sniffing attacks
Analyzing network reconnaissance techniques
Detect password cracking attempts
Miscellaneous attacks
Complementary tools to Wireshark
Important display filters
Nailing the CTF challenge
Summary
Chapter 4. Probing E-mail Communications
E-mail forensics challenges
Analyzing attacks on e-mail communications
Important filters
Summary
Chapter 5. Inspecting Malware Traffic
Gearing up Wireshark
Malicious traffic analysis
IRC botnet(s)
Summary
Chapter 6. Network Performance Analysis
Creating a custom profile for troubleshooting
Optimization before analysis
TCP-based issues
Case study 1 – Slow Internet
Case study 2 – Sluggish downloads
Case study 3 – Denial of Service
Summary
Index
更新时间:2021-07-16 13:28:09