官术网_书友最值得收藏!

What this book covers

Chapter 1, Getting Acquainted with Wireshark, starts with the first step. This introductory chapter will help you quickly start developing proficiency with Wireshark by getting it installed and doing something fun and useful, such as performing a packet capture, isolating and filtering some traffic of interest, and saving a trace file before diving into more details and the supporting concepts in the later chapters.

Chapter 2, Networking for Packet Analysts, provides an overview of network technologies, foundational network protocols including IP, UDP, and TCP, and how the most common protocols fit together within the OSI and DARPA model levels. The goal of this chapter is to develop a good mental model of how networks and protocols function together to allow you to confidently and effectively approach packet-level analysis.

Chapter 3, Capturing All the Right Packets, covers the details of how to correctly position Wireshark in the network and configure it to capture the desired packets, how to identify network conversations of interest and apply display filters to isolate just those packets, and finally save a filtered file for further or later analysis. These are the essential skills that support practical packet analysis.

Chapter 4, Configuring Wireshark, provides a number of features that can be configured and employed to enhance the accuracy and ease of analysis activities. The various ways to display and interpret packet timestamps are especially important and we'll cover these topics thoroughly, along with other essential configuration options, packet list coloring to help identify important events, and how to save different configurations in customized profiles that can be tailored and selected for various analysis tasks.

Chapter 5, Network Protocols, covers a number of other essential and useful network protocols that you should be familiar with, including ICMP, DNS, DHCP, an introductory review of Internet Protocol Version 6 (IPv6), and an example application layer protocol (HTTP). We will also discuss basic Wireshark capture and display filters.

Chapter 6, Troubleshooting and Performance Analysis, provides methodologies to apply your new skills and protocol knowledge to the primary purpose for which Wireshark was developed: troubleshooting and analyzing network and application issues and performance. We'll cover the top reasons for poor performance and how to use Wireshark to detect and measure them.

Chapter 7, Packet Analysis for Security Tasks, introduces the use of Wireshark to detect and analyze suspect traffic such as scans and sweeps, operating system fingerprinting, malformed packets, phone home traffic, and other unusual packets and patterns that could indicate malicious origin.

Chapter 8, Command-line and Other Utilities, covers some of the most useful command-line utilities provided with Wireshark to perform packet captures with minimal resources and to manipulate packet trace files. We will also discuss a few other tools that can help you round out your packet analysis toolset.

主站蜘蛛池模板: 仪陇县| 宿松县| 广河县| 商河县| 黄石市| 玉溪市| 雅江县| 英山县| 阿拉善左旗| 宁南县| 凌源市| 札达县| 绥棱县| 准格尔旗| 铜川市| 方山县| 泗水县| 凤翔县| 互助| 永安市| 兴宁市| 焉耆| 雷波县| 新闻| 苏州市| 绥宁县| 郸城县| 淅川县| 泽州县| 正蓝旗| 海林市| 克东县| 洮南市| 陈巴尔虎旗| 凌云县| 曲松县| 晴隆县| 保靖县| 九台市| 高陵县| 磐安县|