万本电子书0元读

万本电子书0元读

顶部广告

Wireshark 2 Quick Start Guide电子书

售       价:¥

4人正在读 | 0人评论 9.8

作       者:Charit Mishra

出  版  社:Packt Publishing

出版时间:2018-06-27

字       数:13.0万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Protect your network as you move from the basics of the Wireshark scenarios to detecting and resolving network anomalies. About This Book ? Learn protocol analysis, optimization and troubleshooting using Wireshark, an open source tool ? Learn the usage of filtering and statistical tools to ease your troubleshooting job ? Quickly perform root-cause analysis over your network in an event of network failure or a security breach Who This Book Is For If you are a security professional or a network enthusiast who is interested in understanding the internal working of networks and packets, then this book is for you. No prior knowledge of Wireshark is needed. What You Will Learn ? Learn how TCP/IP works? ? Install Wireshark and understand its GUI ? Creation and Usage of Filters to ease analysis process ? Understand the usual and unusual behaviour of Protocols ? Troubleshoot network anomalies quickly with help of Wireshark ? Use Wireshark as a diagnostic tool for network security analysis to identify source of malware ? Decrypting wireless traffic ? Resolve latencies and bottleneck issues in the network In Detail Wireshark is an open source protocol analyser, commonly used among the network and security professionals. Currently being developed and maintained by volunteer contributions of networking experts from all over the globe. Wireshark is mainly used to analyze network traffic, analyse network issues, analyse protocol behaviour, etc. - it lets you see what's going on in your network at a granular level. This book takes you from the basics of the Wireshark environment to detecting and resolving network anomalies. This book will start from the basics of setting up your Wireshark environment and will walk you through the fundamentals of networking and packet analysis. As you make your way through the chapters, you will discover different ways to analyse network traffic through creation and usage of filters and statistical features. You will look at network security packet analysis, command-line utilities, and other advanced tools that will come in handy when working with day-to-day network operations. By the end of this book, you have enough skill with Wireshark 2 to overcome real-world network challenges. Style and approach Learn and practice the skills of protocol and network analysis using the tool of the pros, Wireshark.
目录展开

Title Page

Copyright and Credits

Wireshark 2 Quick Start Guide

Packt Upsell

Why subscribe?

PacktPub.com

Contributors

About the author

About the reviewer

Packt is searching for authors like you

Preface

Who this book is for

What this book covers

To get the most out of this book

Download the color images

Conventions used

Get in touch

Reviews

Installing Wireshark

Introduction to Wireshark

Why use Wireshark?

The installation process

Troubleshooting common installation errors

A brief overview of the TCP/IP model

The layers in the TCP/IP model

Summary

Introduction to Wireshark and Packet Analysis

What is Wireshark?

How Wireshark works

An introduction to packet analysis with Wireshark

How to do packet analysis

Capturing methodologies

Hub-based networks

The switched environment

ARP poisoning

Passing through routers

The Wireshark GUI

Starting our first capture

Summary

Filtering Our Way in Wireshark

Introducing filters

Capture filters

Why use capture filters

How to use capture filters

An example capture filter

Display filters

Retaining filters for later use

Searching for packets using the Find dialog

Colorize traffic

Create new Wireshark profiles

Summary

Analyzing Application Layer Protocols

Domain Name System (DNS)

Dissecting a DNS packet

Dissecting DNS query/response

File transfer protocol

Dissecting FTP communication packets

Hypertext Transfer Protocol (HTTP)

How request/response works

Request

Response

Simple Mail Transfer Protocol (SMTP)

Dissecting SMTP communication packets

Session Initiation Protocol (SIP) and Voice Over Internet Protocol(VOIP)

Reassembling packets for playback

Decrypting encrypted traffic (SSL/TLS)

Summary

Analyzing the Transport Layer Protocols TCP/UDP

The transmission control protocol

Understanding the TCP header and its various flags

How TCP communicates

How it works

How sequence numbers are generated and managed

RST (reset) packets

Unusual TCP traffic

The User Datagram Protocol

The UDP header

How it works

The DHCP

The TFTP

Unusual UDP traffic

Summary

Network Security Packet Analysis

Information gathering

PING sweep

Half-open scan (SYN)

OS fingerprinting

ARP poisoning

Analysing brute force attacks

Inspecting malicious traffic (malware)

Summary

Analyzing Traffic in Thin Air

Understanding IEEE 802.11

Various modes in wireless communications

Usual and unusual wireless traffic

WPA Enterprise

Decrypting wireless network traffic

Summary

Mastering the Advanced Features of Wireshark

The Statistics menu

Using the Statistics menu

Protocol Hierarchy

Conversations

Endpoints

Follow TCP Streams

Command line-fu

Summary

Other Books You May Enjoy

Leave a review - let other readers know what you think

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部