Wireshark Revealed: Essential Skills for IT Professionals: Get up and running with Wireshark to analyze your network effectively

· ·
· Packt Publishing Ltd
4.5
4 reviews
Ebook
912
Pages

About this ebook

Master Wireshark and discover how to analyze network packets and protocols effectively, along with engaging recipes to troubleshoot network problemsAbout This BookGain valuable insights into the network and application protocols, and the key fields in each protocolUse Wireshark's powerful statistical tools to analyze your network and leverage its expert system to pinpoint network problemsMaster Wireshark and train it as your network snifferWho This Book Is For

This book is aimed at IT professionals who want to develop or enhance their packet analysis skills. A basic familiarity with common network and application services terms and technologies is assumed.

What You Will LearnDiscover how packet analysts view networks and the role of protocols at the packet levelCapture and isolate all the right packets to perform a thorough analysis using Wireshark's extensive capture and display filtering capabilitiesDecrypt encrypted wireless trafficUse Wireshark as a diagnostic tool and also for network security analysis to keep track of malwareFind and resolve problems due to bandwidth, throughput, and packet lossIdentify and locate faults in communication applications including HTTP, FTP, mail, and various other applications – Microsoft OS problems, databases, voice, and video over IPIdentify and locate faults in detecting security failures and security breaches in the networkIn Detail

This Learning Path starts off installing Wireshark, before gradually taking you through your first packet capture, identifying and filtering out just the packets of interest, and saving them to a new file for later analysis. You will then discover different ways to create and use capture and display filters. By halfway through the book, you'll be mastering Wireshark features, analyzing different layers of the network protocol, and looking for any anomalies.We then start Ethernet and LAN switching, through IP, and then move on to TCP/UDP with a focus on TCP performance problems. It also focuses on WLAN security. Then, we go through application behavior issues including HTTP, mail, DNS, and other common protocols. This book finishes with a look at network forensics and how to locate security problems that might harm the network.This course provides you with highly practical content explaining Metasploit from the following books:

Wireshark EssentialsNetwork Analysis Using Wireshark CookbookMastering WiresharkStyle and approach

This step-by-step guide follows a practical approach, starting from the basic to the advanced aspects. Through a series of real-world examples, this learning path will focus on making it easy for you to become an expert at using Wireshark.

Ratings and reviews

4.5
4 reviews
Anil Das
May 12, 2021
AÀA BOSS NETWORK
Did you find this helpful?
Anil Das
May 9, 2021
AÀA BOSS NETWORK
Did you find this helpful?
Anil Das
November 13, 2020
AAA
Did you find this helpful?

About the author

James H Baxter is the president and CEO of PacketIQ Inc., which specializes in network and application performance analysis and management, including development of advanced analysis frameworks and tools. With over 30 years of experience in the IT industry, James' diverse technical background includes electronics, RF, satellite, data/telecom, LAN/WAN and voice design, network management, speech technologies, Java/.NET programming, and for most of the last 20 years, working specifically with network and application performance issues. James is a Wireshark Certified Network Analyst (WCNA), a member of the IEEE, Computer Measurement Group, Association of Computing Machinery, and follows advancements in artificial intelligence. James is also a private pilot, holds an Extra class amateur radio license, and is a mediocre guitar player and amateur astronomer.

Yoram Orzach gained his Bachelor's degree in Science from the Technion in Haifa, Israel, and worked in Bezeq as a systems engineer in the fields of transmission and access networks from 1991 to 1995. In 1995, he joined Netplus from the Leadcom group as technical manager, and since 1999 he has worked as the CTO of NDI Communications, involved in the design, implementation, and troubleshooting of data communication networks worldwide. Yoram's experience is both with corporate networks, service providers, and Internet service provider's networks, and among his customers are companies such as Comverse, Motorola, Intel, Ceragon networks, Marvel, HP, and others. Yoram's experience is in design, implementation, and troubleshooting, along with training for R&D, engineering, and IT groups.

Charit Mishra works as a consultant and pentester at Protiviti, one of the top global consulting firms. He enjoys his job, which involves helping clients identify security vulnerabilities, more than anything. With real hands-on experience in security, he has obtained leading industry certifications such as OSCP, CEH, CompTIA Security+, and CCNA R&S. He also holds a master's degree in computer science. He has delivered professional talks at various institutions and private organizations on information security and penetration testing.

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.