Packet Analysis with Wireshark
eBook - ePub

Packet Analysis with Wireshark

  1. 172 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Packet Analysis with Wireshark

About this book

Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis

About This Book

  • Gain hands-on experience of troubleshooting errors in TCP/IP and SSL protocols through practical use cases
  • Identify and overcome security flaws in your network to get a deeper insight into security analysis
  • This is a fast-paced book that focuses on quick and effective packet captures through practical examples and exercises

Who This Book Is For

If you are a network or system administrator who wants to effectively capture packets, a security consultant who wants to audit packet flows, or a white hat hacker who wants to view sensitive information and remediate it, this book is for you. This book requires decoding skills and a basic understanding of networking.

What You Will Learn

  • Utilize Wireshark's advanced features to analyze packet captures
  • Locate the vulnerabilities in an application server
  • Get to know more about protocols such as DHCPv6, DHCP, DNS, SNMP, and HTTP with Wireshark
  • Capture network packets with tcpdump and snoop with examples
  • Find out about security aspects such as OS-level ARP scanning
  • Set up 802.11 WLAN captures and discover more about the WAN protocol
  • Enhance your troubleshooting skills by understanding practical TCP/IP handshake and state diagrams

In Detail

Wireshark provides a very useful way to decode an RFC and examine it. The packet captures displayed in Wireshark give you an insight into the security and flaws of different protocols, which will help you perform the security research and protocol debugging.

The book starts by introducing you to various packet analyzers and helping you find out which one best suits your needs. You will learn how to use the command line and the Wireshark GUI to capture packets by employing filters. Moving on, you will acquire knowledge about TCP/IP communication and its use cases. You will then get an understanding of the SSL/TLS flow with Wireshark and tackle the associated problems with it. Next, you will perform analysis on application-related protocols. We follow this with some best practices to analyze wireless traffic. By the end of the book, you will have developed the skills needed for you to identify packets for malicious attacks, intrusions, and other malware attacks.

Style and approach

This is an easy-to-follow guide packed with illustrations and equipped with lab exercises to help you reproduce scenarios using a sample program and command lines.

Tools to learn more effectively

Saving Books

Saving Books

Keyword Search

Keyword Search

Annotating Text

Annotating Text

Listen to it instead

Listen to it instead

Information

Packet Analysis with Wireshark


Table of Contents

Packet Analysis with Wireshark
Credits
About the Author
About the Reviewers
www.PacktPub.com
Support files, eBooks, discount offers, and more
Why subscribe?
Free access for Packt account holders
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Downloading the example code
Errata
Piracy
Questions
1. Packet Analyzers
Uses for packet analyzers
Introducing Wireshark
Wireshark features
Wireshark's dumpcap and tshark
The Wireshark packet capture process
Other packet analyzer tools
Mobile packet capture
Summary
2. Capturing Packets
Guide to capturing packets
Capturing packets with Interface Lists
Common interface names
Capturing packets with Start options
Capturing packets with Capture Options
The capture filter options
Auto-capturing a file periodically
Troubleshooting
Wireshark user interface
The Filter toolbar
Filtering techniques
Filter examples
The Packet List pane
The Packet Details pane
The Packet Bytes pane
Wireshark features
Decode-As
Protocol preferences
The IO graph
Following the TCP stream
Exporting the displayed packet
Generating the firewall ACL rules
Tcpdump and snoop
References
Summary
3. Analyzing the TCP Network
Recapping TCP
TCP header fields
TCP states
TCP connection establishment and clearing
TCP three-way handshake
Handshake message – first step [SYN]
Handshake message – second step [SYN, ACK]
Handshake message – third step [ACK]
TCP data communication
TCP close sequence
Lab exercise
TCP troubleshooting
TCP reset sequence
RST after SYN-ACK
RST after SYN
Lab exercise
TCP CLOSE_WAIT
Lab exercise
How to resolve TCP CLOSE_STATE
TCP TIME_WAIT
TCP latency issues
Cause of latency
Identifying latency
Server latency example
Wire latency
Wireshark TCP sequence analysis
TCP retransmission
Lab exercise
TCP ZeroWindow
TCP Window Update
TCP Dup-ACK
References
Summary
4. Analyzing SSL/TLS
An introduction to SSL/TLS
SSL/TLS versions
The SSL/TLS component
The SSL/TLS handshake
Types of handshake message
Client Hello
Server Hello
Server certificate
Server Key Exchange
Client certificate request
Server Hello Done
Client certificate
Client Key Exchange
Client Certificate Verify
Change Cipher Spec
Finished
Application Data
Alert Protocol
Key exchange
The Diffie-Hellman key exchange
Elliptic curve Diffie-Hellman key exchange
RSA
Decrypting SSL/TLS
Decrypting RSA traffic
Decrypting DHE/ECHDE traffic
Forward secrecy
Debugging issues
Summary
5. Analyzing Application Layer Protocols
DHCPv6
DHCPv6 Wireshark filter
Multicast addresses
The UDP port information
DHCPv6 message types
Message exchanges
The four-message exchange
The two-message exch...

Table of contents

  1. Packet Analysis with Wireshark

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn how to download books offline
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 990+ topics, we’ve got you covered! Learn about our mission
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more about Read Aloud
Yes! You can use the Perlego app on both iOS and Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app
Yes, you can access Packet Analysis with Wireshark by Anish Nath in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Networking. We have over one million books available in our catalogue for you to explore.