- Wireshark Essentials
- James H. Baxter
- 463字
- 2021-08-05 17:35:15
What this book covers
Chapter 1, Getting Acquainted with Wireshark, starts with the first step. This introductory chapter will help you quickly start developing proficiency with Wireshark by getting it installed and doing something fun and useful, such as performing a packet capture, isolating and filtering some traffic of interest, and saving a trace file before diving into more details and the supporting concepts in the later chapters.
Chapter 2, Networking for Packet Analysts, provides an overview of network technologies, foundational network protocols including IP, UDP, and TCP, and how the most common protocols fit together within the OSI and DARPA model levels. The goal of this chapter is to develop a good mental model of how networks and protocols function together to allow you to confidently and effectively approach packet-level analysis.
Chapter 3, Capturing All the Right Packets, covers the details of how to correctly position Wireshark in the network and configure it to capture the desired packets, how to identify network conversations of interest and apply display filters to isolate just those packets, and finally save a filtered file for further or later analysis. These are the essential skills that support practical packet analysis.
Chapter 4, Configuring Wireshark, provides a number of features that can be configured and employed to enhance the accuracy and ease of analysis activities. The various ways to display and interpret packet timestamps are especially important and we'll cover these topics thoroughly, along with other essential configuration options, packet list coloring to help identify important events, and how to save different configurations in customized profiles that can be tailored and selected for various analysis tasks.
Chapter 5, Network Protocols, covers a number of other essential and useful network protocols that you should be familiar with, including ICMP, DNS, DHCP, an introductory review of Internet Protocol Version 6 (IPv6), and an example application layer protocol (HTTP). We will also discuss basic Wireshark capture and display filters.
Chapter 6, Troubleshooting and Performance Analysis, provides methodologies to apply your new skills and protocol knowledge to the primary purpose for which Wireshark was developed: troubleshooting and analyzing network and application issues and performance. We'll cover the top reasons for poor performance and how to use Wireshark to detect and measure them.
Chapter 7, Packet Analysis for Security Tasks, introduces the use of Wireshark to detect and analyze suspect traffic such as scans and sweeps, operating system fingerprinting, malformed packets, phone home traffic, and other unusual packets and patterns that could indicate malicious origin.
Chapter 8, Command-line and Other Utilities, covers some of the most useful command-line utilities provided with Wireshark to perform packet captures with minimal resources and to manipulate packet trace files. We will also discuss a few other tools that can help you round out your packet analysis toolset.
- 愛(ài)上單片機(jī)(第2版)
- LED應(yīng)用技術(shù)
- 電子產(chǎn)品調(diào)試技能上崗實(shí)訓(xùn)
- 大話無(wú)線通信:網(wǎng)絡(luò)設(shè)計(jì)完全攻略
- 21堂課精通電子元器件檢測(cè)
- 混沌同步控制方法及在保密通信中的應(yīng)用
- 遇見(jiàn)新商業(yè)(《商業(yè)評(píng)論》2018年1月號(hào))
- 天地一體化信息網(wǎng)絡(luò)時(shí)間統(tǒng)一技術(shù)
- 光纖通信技術(shù)及應(yīng)用
- 應(yīng)用商店核心用戶在線評(píng)論對(duì)消費(fèi)者更新決策的影響研究
- 經(jīng)典礦石機(jī)鑒賞與現(xiàn)代礦石機(jī)制作
- 通信專業(yè)綜合能力與實(shí)務(wù):交換技術(shù)
- 電工與電子技術(shù)及技能訓(xùn)練
- Nginx Module Extension
- 通信系統(tǒng)導(dǎo)論