Summary and Info
A succinct guide to securely administer your network using Wireshark About This BookMake the most of Wireshark by breezing through all its features and analyzing network security threatsFull of scenarios faced by security analysts along with comprehensive solutionsPacked with step-by-step instructions to walk you through the capabilities of WiresharkWho This Book Is ForIf you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.What You Will LearnFamiliarize yourself with the robust features offered by WiresharkUse the powerful command-line utilities shipped with WiresharkAnalyze numerous threats to network security using WiresharkInvestigate attacks performed using popular security tools such as Nmap, Nessus, Metasploit, and moreSolve real-world CTF challenges using WiresharkCreate your own security-related profile in WiresharkConfigure Wireshark for effective network troubleshootingGet accustomed to common scenarios faced by security analystsAnalyze malware traffic successfully by using WiresharkUnearth anomalies hampering the speed of network communicationsIn DetailWireshark is the world's foremost network protocol analyzer for network analysis and troubleshooting.This book will walk you through exploring and harnessing the vast potential of Wireshark, the world's foremost network protocol analyzer.The book begins by introducing you to the foundations of Wireshark and showing you how to browse the numerous features it provides. You'll be walked through using these features to detect and analyze the different types of attacks that can occur on a network. As you progress through the chapters of this book, you'll learn to perform sniffing on a network, analyze clear-text traffic on the wire, recognize botnet threats, and analyze Layer 2 and Layer 3 attacks along with other common hacks.By the end of this book, you will be able to fully utilize the features of Wireshark that will help you securely administer your network.