Wireshark Revealed: Essential Skills for IT Professionals: Get up and running with Wireshark to analyze your network effectively

· ·
· Packt Publishing Ltd
4,5
4 avis
E-book
912
Pages

À propos de cet e-book

Master Wireshark and discover how to analyze network packets and protocols effectively, along with engaging recipes to troubleshoot network problemsAbout This BookGain valuable insights into the network and application protocols, and the key fields in each protocolUse Wireshark's powerful statistical tools to analyze your network and leverage its expert system to pinpoint network problemsMaster Wireshark and train it as your network snifferWho This Book Is For

This book is aimed at IT professionals who want to develop or enhance their packet analysis skills. A basic familiarity with common network and application services terms and technologies is assumed.

What You Will LearnDiscover how packet analysts view networks and the role of protocols at the packet levelCapture and isolate all the right packets to perform a thorough analysis using Wireshark's extensive capture and display filtering capabilitiesDecrypt encrypted wireless trafficUse Wireshark as a diagnostic tool and also for network security analysis to keep track of malwareFind and resolve problems due to bandwidth, throughput, and packet lossIdentify and locate faults in communication applications including HTTP, FTP, mail, and various other applications – Microsoft OS problems, databases, voice, and video over IPIdentify and locate faults in detecting security failures and security breaches in the networkIn Detail

This Learning Path starts off installing Wireshark, before gradually taking you through your first packet capture, identifying and filtering out just the packets of interest, and saving them to a new file for later analysis. You will then discover different ways to create and use capture and display filters. By halfway through the book, you'll be mastering Wireshark features, analyzing different layers of the network protocol, and looking for any anomalies.We then start Ethernet and LAN switching, through IP, and then move on to TCP/UDP with a focus on TCP performance problems. It also focuses on WLAN security. Then, we go through application behavior issues including HTTP, mail, DNS, and other common protocols. This book finishes with a look at network forensics and how to locate security problems that might harm the network.This course provides you with highly practical content explaining Metasploit from the following books:

Wireshark EssentialsNetwork Analysis Using Wireshark CookbookMastering WiresharkStyle and approach

This step-by-step guide follows a practical approach, starting from the basic to the advanced aspects. Through a series of real-world examples, this learning path will focus on making it easy for you to become an expert at using Wireshark.

Notes et avis

4,5
4 avis

À propos de l'auteur

James H Baxter is the president and CEO of PacketIQ Inc., which specializes in network and application performance analysis and management, including development of advanced analysis frameworks and tools. With over 30 years of experience in the IT industry, James' diverse technical background includes electronics, RF, satellite, data/telecom, LAN/WAN and voice design, network management, speech technologies, Java/.NET programming, and for most of the last 20 years, working specifically with network and application performance issues. James is a Wireshark Certified Network Analyst (WCNA), a member of the IEEE, Computer Measurement Group, Association of Computing Machinery, and follows advancements in artificial intelligence. James is also a private pilot, holds an Extra class amateur radio license, and is a mediocre guitar player and amateur astronomer.

Yoram Orzach gained his Bachelor's degree in Science from the Technion in Haifa, Israel, and worked in Bezeq as a systems engineer in the fields of transmission and access networks from 1991 to 1995. In 1995, he joined Netplus from the Leadcom group as technical manager, and since 1999 he has worked as the CTO of NDI Communications, involved in the design, implementation, and troubleshooting of data communication networks worldwide. Yoram's experience is both with corporate networks, service providers, and Internet service provider's networks, and among his customers are companies such as Comverse, Motorola, Intel, Ceragon networks, Marvel, HP, and others. Yoram's experience is in design, implementation, and troubleshooting, along with training for R&D, engineering, and IT groups.

Charit Mishra works as a consultant and pentester at Protiviti, one of the top global consulting firms. He enjoys his job, which involves helping clients identify security vulnerabilities, more than anything. With real hands-on experience in security, he has obtained leading industry certifications such as OSCP, CEH, CompTIA Security+, and CCNA R&S. He also holds a master's degree in computer science. He has delivered professional talks at various institutions and private organizations on information security and penetration testing.

Donner une note à cet e-book

Dites-nous ce que vous en pensez.

Informations sur la lecture

Smartphones et tablettes
Installez l'application Google Play Livres pour Android et iPad ou iPhone. Elle se synchronise automatiquement avec votre compte et vous permet de lire des livres en ligne ou hors connexion, où que vous soyez.
Ordinateurs portables et de bureau
Vous pouvez écouter les livres audio achetés sur Google Play à l'aide du navigateur Web de votre ordinateur.
Liseuses et autres appareils
Pour lire sur des appareils e-Ink, comme les liseuses Kobo, vous devez télécharger un fichier et le transférer sur l'appareil en question. Suivez les instructions détaillées du Centre d'aide pour transférer les fichiers sur les liseuses compatibles.