FirstCity
Welcome to First City University College Library iPortal | library@firstcity.edu.my | +603-7735 2088 (Ext. 519)
Amazon cover image
Image from Amazon.com

Mastering Wireshark : analyze data network like a professional by mastering Wireshark, from 0 to 1337 / Charit Mishra.

By: Material type: TextTextSeries: Community experience distilledPublisher: Birmingham, UK : Packt Publishing, 2016Copyright date: �2016Description: 1 online resource (ix, 291 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 178398953X
  • 9781783989539
Subject(s): Genre/Form: DDC classification:
  • 004.6/2 23
LOC classification:
  • TK5105.55 .M57 2016
Online resources:
Contents:
Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Welcome to the World of Packet Analysis with Wireshark; Introduction to Wireshark; A brief overview of the TCP/IP model; The layers in the TCP/IP model; An introduction to packet analysis with Wireshark; How to do packet analysis; What is Wireshark?; How it works; Capturing methodologies; Hub-based networks; The switched environment; ARP poisoning; Passing through routers; Why use Wireshark?; The Wireshark GUI; The installation process; Starting our first capture
Working with IO, Flow, and TCP stream graphsIO graphs; Flow graphs; TCP stream graphs; Round-trip time graphs; Throughput graphs; The Time-sequence graph (tcptrace); Follow TCP streams; Expert Infos; Command Line-fu; Summary; Exercise; Chapter 4: Inspecting Application Layer Protocols; Domain name system; Dissecting a DNS packet; Dissecting DNS query/response; Unusual DNS traffic; File transfer protocol; Dissecting FTP communications; Passive mode; Active mode; Dissecting FTP packets; Unusual FTP; Hyper Text Transfer Protocol; How it works -- request/response; Request; Response
Unusual HTTP trafficSimple Mail Transfer Protocol; Usual versus unusual SMTP traffic; Session Initiation Protocol and Voice Over Internet Protocol; Analyzing VOIP traffic; Reassembling packets for playback; Unusual traffic patterns; Decrypting encrypted traffic (SSL/TLS); Summary; Practice questions:; Chapter 5: Analyzing Transport Layer Protocols; The transmission control protocol; Understanding the TCP header and its various flags; How TCP communicates; How it works; Graceful termination; RST (reset) packets; Relative verses Absolute numbers; Unusual TCP traffic
How to check for different analysis flags in WiresharkThe User Datagram Protocol; A UDP header; How it works; The DHCP; The TFTP; Unusual UDP traffic; Summary; Practice questions; Chapter 6: Analyzing Traffic in Thin Air; Understanding IEEE 802.11; Various modes in wireless communications; Wireless interference and strength; The IEEE 802.11 packet structure; RTS/CTS; Usual and unusual WEP -- open/shared key communication; WEP-open key; The shared key; WPA-Personal; WPA-Enterprise; Decrypting WEP and WPA traffic; Summary; Practice questions; Chapter 7: Network Security Analysis
Summary: Annotation Analyze data network like a professional by mastering Wireshark - From 0 to 1337About This Book Master Wireshark and train it as your network sniffer Impress your peers and get yourself pronounced as a network doctor Understand Wireshark and its numerous features with the aid of this fast-paced book packed with numerous screenshots, and become a pro at resolving network anomaliesWho This Book Is ForAre you curious to know what's going on in a network? Do you get frustrated when you are unable to detect the cause of problems in your networks? This is where the book comes into play.Mastering Wireshark is for developers or network enthusiasts who are interested in understanding the internal workings of networks and have prior knowledge of using Wireshark, but are not aware about all of its functionalities.What You Will Learn Install Wireshark and understand its GUI and all the functionalities of it Create and use different filters Analyze different layers of network protocols and know the amount of packets that flow through the network Decrypt encrypted wireless traffic Use Wireshark as a diagnostic tool and also for network security analysis to keep track of malware Troubleshoot all the network anomalies with help of Wireshark Resolve latencies and bottleneck issues in the networkIn DetailWireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form.Mastering Wireshark will help you raise your knowledge to an expert level. At the start of the book, you will be taught how to install Wireshark, and will be introduced to its interface so you understand all its functionalities. Moving forward, you will discover different ways to create and use capture and display filters. Halfway through the book, you'll be mastering the features of Wireshark, analyzing different layers of the network protocol, looking for any anomalies. As you reach to the end of the book, you will be taught how to use Wireshark for network security analysis and configure it for troubleshooting purposes.Style and approach Every chapter in this book is explained to you in an easy way accompanied by real-life examples and screenshots of the interface, making it easy for you to become an expert at using Wireshark.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Includes index.

Annotation Analyze data network like a professional by mastering Wireshark - From 0 to 1337About This Book Master Wireshark and train it as your network sniffer Impress your peers and get yourself pronounced as a network doctor Understand Wireshark and its numerous features with the aid of this fast-paced book packed with numerous screenshots, and become a pro at resolving network anomaliesWho This Book Is ForAre you curious to know what's going on in a network? Do you get frustrated when you are unable to detect the cause of problems in your networks? This is where the book comes into play.Mastering Wireshark is for developers or network enthusiasts who are interested in understanding the internal workings of networks and have prior knowledge of using Wireshark, but are not aware about all of its functionalities.What You Will Learn Install Wireshark and understand its GUI and all the functionalities of it Create and use different filters Analyze different layers of network protocols and know the amount of packets that flow through the network Decrypt encrypted wireless traffic Use Wireshark as a diagnostic tool and also for network security analysis to keep track of malware Troubleshoot all the network anomalies with help of Wireshark Resolve latencies and bottleneck issues in the networkIn DetailWireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form.Mastering Wireshark will help you raise your knowledge to an expert level. At the start of the book, you will be taught how to install Wireshark, and will be introduced to its interface so you understand all its functionalities. Moving forward, you will discover different ways to create and use capture and display filters. Halfway through the book, you'll be mastering the features of Wireshark, analyzing different layers of the network protocol, looking for any anomalies. As you reach to the end of the book, you will be taught how to use Wireshark for network security analysis and configure it for troubleshooting purposes.Style and approach Every chapter in this book is explained to you in an easy way accompanied by real-life examples and screenshots of the interface, making it easy for you to become an expert at using Wireshark.

Description based on online resource; title from digital title page (viewed on August 14, 2018).

Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Welcome to the World of Packet Analysis with Wireshark; Introduction to Wireshark; A brief overview of the TCP/IP model; The layers in the TCP/IP model; An introduction to packet analysis with Wireshark; How to do packet analysis; What is Wireshark?; How it works; Capturing methodologies; Hub-based networks; The switched environment; ARP poisoning; Passing through routers; Why use Wireshark?; The Wireshark GUI; The installation process; Starting our first capture

Working with IO, Flow, and TCP stream graphsIO graphs; Flow graphs; TCP stream graphs; Round-trip time graphs; Throughput graphs; The Time-sequence graph (tcptrace); Follow TCP streams; Expert Infos; Command Line-fu; Summary; Exercise; Chapter 4: Inspecting Application Layer Protocols; Domain name system; Dissecting a DNS packet; Dissecting DNS query/response; Unusual DNS traffic; File transfer protocol; Dissecting FTP communications; Passive mode; Active mode; Dissecting FTP packets; Unusual FTP; Hyper Text Transfer Protocol; How it works -- request/response; Request; Response

Unusual HTTP trafficSimple Mail Transfer Protocol; Usual versus unusual SMTP traffic; Session Initiation Protocol and Voice Over Internet Protocol; Analyzing VOIP traffic; Reassembling packets for playback; Unusual traffic patterns; Decrypting encrypted traffic (SSL/TLS); Summary; Practice questions:; Chapter 5: Analyzing Transport Layer Protocols; The transmission control protocol; Understanding the TCP header and its various flags; How TCP communicates; How it works; Graceful termination; RST (reset) packets; Relative verses Absolute numbers; Unusual TCP traffic

How to check for different analysis flags in WiresharkThe User Datagram Protocol; A UDP header; How it works; The DHCP; The TFTP; Unusual UDP traffic; Summary; Practice questions; Chapter 6: Analyzing Traffic in Thin Air; Understanding IEEE 802.11; Various modes in wireless communications; Wireless interference and strength; The IEEE 802.11 packet structure; RTS/CTS; Usual and unusual WEP -- open/shared key communication; WEP-open key; The shared key; WPA-Personal; WPA-Enterprise; Decrypting WEP and WPA traffic; Summary; Practice questions; Chapter 7: Network Security Analysis

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide