- Wireshark 2 Quick Start Guide
- Charit Mishra
- 107字
- 2021-06-25 20:45:49
Capturing methodologies
In order to capture the right set of a packets stream, you would need to know where to place your protocol analyser. Depending on the requirements (source of packets, number of packets, type of packets, and more), a protocol analyzer needs to be placed at a certain point in the network. Also, a few configuration changes in a network device may be necessary, such as switch configuration changes (mirroring is done in network switches to capture packets from one or more sources). The following sub sections discuss a few means of assessing the best way of configuring protocol analyses in certain types of topology.
推薦閱讀
- Node Security
- INSTANT Netcat Starter
- 數(shù)字身份與元宇宙信任治理
- 可信計算3.0工程初步
- 黑客攻防技巧
- INSTANT Metasploit Starter
- Learning Devise for Rails
- 學(xué)電腦安全與病毒防范
- 網(wǎng)絡(luò)安全與攻防入門很輕松(實戰(zhàn)超值版)
- 先進(jìn)云安全研究與實踐
- 網(wǎng)絡(luò)安全大數(shù)據(jù)分析與實戰(zhàn)
- Learning Pentesting for Android Devices
- 博弈論與數(shù)據(jù)安全
- 云計算安全:關(guān)鍵技術(shù)、原理及應(yīng)用
- 社會工程:防范釣魚欺詐(卷3)