文件名称:
Mastering Wireshark.pdf
开发工具:
文件大小: 21mb
下载次数: 0
上传时间: 2019-10-20
详细说明:This book is written from a standpoint of using Wireshark to understand and troubleshoot commonly seen network anomalies. It can be the start of your journey into the world of networks/traffic/packet analysis.Table of contents
Mastering Wireshark
Credits
about the author
about the reviewer
www.packtpub.com
e Books. discount offers and more
Why subscribe?
Preface
What this book coⅴers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Downloading the color images of this book
Errata
P
Questions
1. Welcome to the World of packet Analysis with Wireshark
Introduction to wireshark
a brief overview of the tcp/ip mode
The lavers in the tcp/iP model
An introduction to packet analysis with Wireshark
How to do packet analysis
What is wireshark?
How it works
Capturing methodologies
Hub-based networks
The switched enyironment
ArP poisoning
Passing through routers
Why use Wireshark?
The Wireshark gui
The installation process
Starting our first capture
Summary
Practice questions
2. Filtering Our Way in Wireshark
An introduction to filters
Capture filters
Why use capture filters
How to use capture filters
An example capture filter
Capture filters that use protocol header values
Display filters
Retaining filters for later use
Searching for packets using the Find dialog
Colorize traffic
Create new Wireshark profiles
Summary
Practice questions
3,Mastering the Advanced Features of Wireshark
he statistics menu
Using the statistics menu
Protocol hierarchy
Conversations
Endpoints
Working with IO, Flow, and TCP stream graphs
Io graphs
Flow graphs
TCP stream graphs
Round-trip time graphs
Throughput graphs
The
he Time-sequence graph (tcptrace
Follow tCp streams
Expert Infos
Command line-fu
Summary
Exercise
4. Inspecting Application Layer Protocols
Domain name system
Dissecting a DNS packet
Dissecting dNs query/response
Unusual dns traffic
File transfer protocol
Dissecting FTP communications
Passive mode
Active mode
Dissecting ftp packets
Unusual Ftp
Hyper Text Transfer protocol
How it works- request/response
Request
Response
Unusualhttptraffic
Simple mail transfer protocol
Usual versus unusual smtp traffic
Session initiation protocol and voice over internet protocol
analyzing voip traffic
Reassembling -packets for playback
Unusual traffic patterns
Decrypting encrypted traffic(SSL/TLS
Summary
Practice questions
Analyzing Transport Layer protocols
The transmission control protocol
Understanding the tCP header and its various flags
How TCP communicates
How it works
Graceful termination
RST(reset)_packets
Relative verses absolute numbers
Unusual tcP traffic
How to check for different analysis flags in wireshark
The User datagram Protocol
a udP header
How it works
The dhcp
The tftp
Unusual udp traffic
Summary
Practice questions
6. Analyzing Traffic in Thin Air
Understanding IEEE 802.11
Various modes in wireless communications
Wireless interference and strength
The ieee 802.11 packet structure
RTS/CTS
Usual and unusual WEp-open/shared key communication
WEP-open key
The shared key
WPA-Personal
WPA-Enterprise
Decrypting WEP and WPA traffic
Summary
Practice questions
7. Network Security Analysis
Information gathering
PING Sweep
Half-open scan(SYN)
OS fingerprinting
ARP poisoning
Analyzing brute force attacks
Inspecting malicious traffic
Solving real-world CTF challenges
Summary
Practice questions
8. Troubleshooting
Recovery features
The flow control mechanism
Troubleshooting slow Internet and network latencies
Client-and server-side latencies
Troubleshooting bottleneck issues
Troubleshooting application-based issues
Summary
Practice questions
9.Introduction to Wireshark v2
The intelligent scroll bar
Translation
Graph improvements
TCP streams
USBPcap
Summary
Practice questions
eX
Mastering wireshark
Mastering Wireshark
Copyright( 2016 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system,
or transmitted in any form or by any means, without the prior written permission of the
publisher, except in the case of brief quotations embedded in critical articles or reviews
Every effort has been made in the preparation of this book to ensure the accuracy of the
information presented. However, the information contained in this book is sold without
warranty, either express or implied. Neither the author nor Packt Publishing, and its
dealers and distributors will be held liable for any damages caused or alleged to be caused
directly or indirectly by this book
Packt Publishing has endeavored to provide trademark information about all of the
companies and products mentioned in this book by the appropriate use of capitals
However, Packt Publishing cannot guarantee the accuracy of this information
www.Technet24.ir
First published: March 2016
Production reference: 1210316
Published by Packt Publishing Ltd
Livery place
35 Livery Street
Birmingham b3 2Pb, UK
ISBN978-178398-952-2
www.packtpub.com
Credits
Author
Charit mishra
Reviewer
Anish nath
Commissioning editor
Kunal parikh
Acquisition editor
Ke
evin colaco
Content Development editor
Onkar wani
echnical editor
Praniali mistry
Copy editor
Neha vyas
Project Coordinator
Bijal Patel
Proofreader
Safis editing
Indexer
Rekha nair
Production coordinator
Manu Josep
Cover work
Manu joseph
About the author
Charit Mishra works as a consultant and pentester at Protiviti, one of the top glob
consulting firms he enjoys his job, which involves helping clients identify secure p
vulnerabilities, more than anything with real hands-on experience in security he has
obtained leading industry certifications such as OSCP, CEH, CompTIA Security+, and
CCNAR&s. He also holds a master ' s degree in computer science. he has delivered
professional talks at various institutions and private organizations on information security
and penetration testing. You can reach him at LinkedIn at
https:/ae.linkedin.com/in/charitmishra,andontwItteratcharito819
First of all, I would like to express my deepest gratitude to my beloved parents and my
lovely sister, Ayushi, for their full support, expert guidance, understanding, and
encouragement throughout my journey of making this possible. Without their incredible
wisdom and counsel, this would have been an overwhelming pursuit
I would like to also thank my good friend and mentor Mr Piyush Verma for believing in
me and guiding me whenever I needed direction. I am also thankful to all my friends and
well wishers, especially Mr Siddarth Pandey, Mr Arham Husain, Mr. Bharath Methari
Mr. Dileep mishra, and a great friend from Pakistan, Mr. Haider Ali Chughtai, who all
helped me in every possible aspects and always motivated me to achieve the best. My
apologies if I've missed anyone out
Last but not least, I am grateful to the amazing team at Packt Publishing for their constant
and incredible support for making this happen, and thanks to all the reviewers who helped
bring this book into the best shape possible
As the great influential Swami Vivekananda said, " In a day, when you don' t come across
any problems, you can be sure that you are traveling on the wrong path
(系统自动生成,下载前可以参看下载内容)
下载文件列表
相关说明
- 本站资源为会员上传分享交流与学习,如有侵犯您的权益,请联系我们删除.
- 本站是交换下载平台,提供交流渠道,下载内容来自于网络,除下载问题外,其它问题请自行百度。
- 本站已设置防盗链,请勿用迅雷、QQ旋风等多线程下载软件下载资源,下载后用WinRAR最新版进行解压.
- 如果您发现内容无法下载,请稍后再次尝试;或者到消费记录里找到下载记录反馈给我们.
- 下载后发现下载的内容跟说明不相乎,请到消费记录里找到下载记录反馈给我们,经确认后退回积分.
- 如下载前有疑问,可以通过点击"提供者"的名字,查看对方的联系方式,联系对方咨询.