Book description
Master the terminal-based version of Wireshark for dealing with network security incidents
- Learn something new in an Instant! A short, fast, focused guide delivering immediate results.
- Terminal-based version of Wireshark for dealing with network security incidents
- Useful filters to quickly identify and limit network problems derived from malware and a variety of network attacks
- Decoding capabilities to investigate suspicious traffic and detect network anomalies
In Detail
Malware, DoS attacks, SQLi, and data exfiltration are some of the problems that many security officers have to face every day. Having advanced knowledge in communications and protocol analysis is therefore essential to investigate and detect any of these attacks. Tshark is the ideal tool for professionals who wish to meet these needs, or students who want to delve into the world of networking.
Instant Traffic Analysis with Tshark How-to is a practical, hands-on guide for network administrators and security officers who want to take advantage of the filtering features provided by Tshark, the command-line version of Wireshark. With this guide you will learn how to get the most out of Tshark from environments lacking GUI, ideal for example in Unix/Linux servers, offering you much flexibility to identify and display network traffic.
The book begins by explaining the basic theoretical concepts of Tshark and the process of data collection. Subsequently, you will see several alternatives to capture traffic based on network infrastructure and the goals of the network administrator. The rest of the book will focus on explaining the most interesting parameters of the tool from a totally practical standpoint.
You will also learn how to decode protocols and how to get evidence of suspicious network traffic. You will become familiar with the many practical filters of Tshark that identify malware-infected computers and lots of network attacks such as DoS attacks, DHCP/ARP spoof, and DNS flooding. Finally, you will see some tricks to automate certain tasks with Tshark and python scripts.
You will learn everything you need to get the most out of Tshark and overcome a wide range of network problems. In addition you will learn a variety of concepts related to networking and network attacks currently exploited.
Table of contents
-
Instant Traffic Analysis with Tshark How-to
- Instant Traffic Analysis with Tshark How-to
- Credits
- About the Author
- About the Reviewer
- www.PacktPub.com
- Preface
-
1. Instant Traffic Analysis with Tshark How-to
- Capturing data with Tshark (Must know)
- Capturing traffic (Must know)
- Delimiting network problems (Should know)
- Implementing useful filters (Should know)
- Decoding protocols (Become an expert)
- Auditing network attacks (Become an expert)
- Analyzing network forensic data (Become an expert)
- Auditing network applications (Must know)
- Analyzing malware traffic (Must know)
- Automating tasks (Must know)
Product information
- Title: Instant Traffic Analysis with Tshark How-to
- Author(s):
- Release date: April 2013
- Publisher(s): Packt Publishing
- ISBN: 9781782165385
You might also like
book
Wireshark & Ethereal Network Protocol Analyzer Toolkit
Ethereal is the #2 most popular open source security tool used by system administrators and security …
article
Run Llama-2 Models Locally with llama.cpp
Llama is Meta’s answer to the growing demand for LLMs. Unlike its well-known technological relative, ChatGPT, …
article
Use Github Copilot for Prompt Engineering
Using GitHub Copilot can feel like magic. The tool automatically fills out entire blocks of code--but …
article
Use GitHub Copilot: Additional Tips
Using GitHub Copilot can feel like magic. The tool automatically fills out entire blocks of code--but …