
Ethical Hacking and Network Analysis with Wireshark
Exploration of network packets for detecting exploits and malware (English Edition)
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Ethical Hacking and Network Analysis with Wireshark
Exploration of network packets for detecting exploits and malware (English Edition)
About this book
Wireshark: A hacker's guide to network insights
Key Features
? Issue resolution to identify and solve protocol, network, and security issues.
? Analysis of network traffic offline through exercises and packet captures.
? Expertise in vulnerabilities to gain upper hand on safeguard systems.
Description
Ethical Hacking and Network Analysis with Wireshark provides you with the tools and expertise to demystify the invisible conversations coursing through your cables. This definitive guide, meticulously allows you to leverage the industry-leading Wireshark to gain an unparalleled perspective on your digital landscape.This book teaches foundational protocols like TCP/IP, SSL/TLS and SNMP, explaining how data silently traverses the digital frontier. With each chapter, Wireshark transforms from a formidable tool into an intuitive extension of your analytical skills. Discover lurking vulnerabilities before they morph into full-blown cyberattacks.Dissect network threats like a forensic scientist and wield Wireshark to trace the digital pulse of your network, identifying and resolving performance bottlenecks with precision. Restructure your network for optimal efficiency, banish sluggish connections and lag to the digital scrapheap.
What you will learn
? Navigate and utilize Wireshark for effective network analysis.
? Identify and address potential network security threats.
? Hands-on data analysis: Gain practical skills through real-world exercises.
? Improve network efficiency based on insightful analysis and optimize network performance.
? Troubleshoot and resolve protocol and connectivity problems with confidence.
? Develop expertise in safeguarding systems against potential vulnerabilities.
Who this book is for
Whether you are a network/system administrator, network security engineer, security defender, QA engineer, ethical hacker or cybersecurity aspirant, this book helps you to see the invisible and understand the digital chatter that surrounds you.
Table of Contents
1. Ethical Hacking and Networking Concepts
2. Getting Acquainted with Wireshark and Setting up the Environment
3. Getting Started with Packet Sniffing
4. Sniffing on 802.11 Wireless Networks
5. Sniffing Sensitive Information, Credentials and Files
6. Analyzing Network Traffic Based on Protocols
7. Analyzing and Decrypting SSL/TLS Traffic
8. Analyzing Enterprise Applications
9. Analysing VoIP Calls Using Wireshark
10. Analyzing Traffic of IoT Devices
11. Detecting Network Attacks with Wireshark
12. Troubleshooting and Performance Analysis Using Wireshark
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Title Page
- Copyright Page
- Dedication Page
- About the Author
- About the Reviewer
- Acknowledgement
- Preface
- Table of Contents
- 1.âEthical Hacking and Networking Concepts
- 2.âGetting Acquainted with Wireshark and Setting up the Environment
- 3.âGetting Started with Packet Sniffing
- 4.âSniffing on 802.11 Wireless Networks
- 5.âSniffing Sensitive Information, Credentials and Files
- 6.âAnalyzing Network Traffic Based on Protocols
- 7.âAnalyzing and Decrypting SSL/TLS Traffic
- 8.âAnalyzing Enterprise Applications
- 9.âAnalysing VoIP Calls Using Wireshark
- 10.âAnalyzing Traffic of IoT Devices
- 11.âDetecting Network Attacks with Wireshark
- 12.âTroubleshooting and Performance Analysis Using Wireshark
- Index