Cargando…

Wireshark network security : a succinct guide to securely administer your network using Wireshark /

If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Verma, Piyush (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2015.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_ocn919509034
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 150901s2015 enka o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d IDEBK  |d EBLCP  |d DEBSZ  |d COO  |d OCLCF  |d YDXCP  |d DEBBG  |d Z5A  |d OCLCQ  |d MERUC  |d OCLCQ  |d CEF  |d NLE  |d UKMGB  |d OCLCQ  |d WYU  |d UAB  |d AU@  |d UKAHL  |d OCLCQ  |d N$T  |d HS0  |d OCLCO  |d K6U  |d OCLCQ  |d OCLCO 
016 7 |a 018007329  |2 Uk 
019 |a 916530898  |a 923517825 
020 |a 1784399515 
020 |a 9781784399511  |q (electronic bk.) 
020 |z 9781784393335 
020 |z 1784393339 
029 1 |a AU@  |b 000056112829 
029 1 |a DEBBG  |b BV043020225 
029 1 |a DEBBG  |b BV043622444 
029 1 |a DEBSZ  |b 445087765 
029 1 |a DEBSZ  |b 455697957 
029 1 |a GBVCP  |b 882744178 
029 1 |a UKMGB  |b 018007329 
035 |a (OCoLC)919509034  |z (OCoLC)916530898  |z (OCoLC)923517825 
037 |a CL0500000637  |b Safari Books Online 
050 4 |a TK5105.5956 
082 0 4 |a 004.66 
049 |a UAMI 
100 1 |a Verma, Piyush,  |e author. 
245 1 0 |a Wireshark network security :  |b a succinct guide to securely administer your network using Wireshark /  |c Piyush Verma. 
246 3 0 |a Succinct guide to securely administer your network using Wireshark 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c 2015. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Community experience distilled 
588 0 |a Online resource; title from cover (Safari, viewed August 26, 2015). 
500 |a Includes index. 
505 0 |a ""Cover ""; ""Copyright""; ""Credits""; ""About the Author""; ""Acknowledgment""; ""About the Reviewers""; ""www.PacktPub.com""; ""Table of Contents""; ""Preface""; ""Chapter 1: Getting Started with Wireshark â€? What, Why, and How? ""; ""Sniffing""; ""The purpose of sniffing""; ""Packet analysis""; ""The tools of the trade""; ""What is Wireshark?""; ""The Wireshark interface â€? Before starting the capture ""; ""Title""; ""Menu""; ""Main toolbar""; ""Filter toolbar""; ""Capture frame""; ""Capture Help""; ""The Files menu""; ""Online""; ""The Status bar""; ""First packet capture"" 
505 8 |a SummaryChapter 2 : Tweaking Wireshark -- Filtering our way through Wireshark -- Capture filters -- Display filters -- The list of display filters -- Wireshark profiles -- Creating a new profile -- Essential techniques in Wireshark -- The Summary window -- The Protocol Hierarchy window -- The Conversations window -- The Endpoints window -- The Expert Infos window -- Wireshark command-line fu -- tshark -- Starting the capture -- Saving the capture to a file -- Using filters -- Statistics -- capinfos -- editcap -- mergecap -- Summary 
505 8 |a Chapter 3 : Analyzing Threats to LAN SecurityAnalyzing clear-text traffic -- Viewing credentials in Wireshark -- FTP -- Telnet -- HTTP -- TFTP -- Reassembling data stream -- Case study -- Examining sniffing attacks -- MAC flooding -- ARP poisoning -- Analyzing network reconnaissance techniques -- Examining network scanning activities -- Detect the scanning activity for live machines -- Identify port scanning attempts -- Other scanning attempts -- OS fingerprinting attempts -- Detect password cracking attempts -- Brute-force attacks 
505 8 |a Identifying POP3 password crackingHTTP basic authentication -- Dictionary-based attacks -- Detecting FTP password cracking -- Miscellaneous attacks -- FTP bounce attack -- DNS zone transfer -- SSL stripping attack -- Complementary tools to Wireshark -- Xplico -- Sysdig -- Pcap2XML -- SSHFlow -- Important display filters -- Filters based on protocols -- DNS -- FTP -- HTTP -- Filters based on unique signatures and regular expressions -- Regular expressions -- Nailing the CTF challenge -- Summary -- Chapter 4 : Probing E-mail Communications 
505 8 |a ""E-mail forensics challenges""""Challenge 1 â€? Normal login session""; ""Challenge 2 â€? Corporate espionage""; ""Analyzing attacks on e-mail communications""; ""Detecting SMTP enumeration""; ""Using an auxiliary module in Metasploit ""; ""Analyzing SMTP relay attack""; ""Important filters""; ""Summary""; ""Chapter 5 : Inspecting Malware Traffic""; ""Gearing up Wireshark""; ""Updated columns""; ""Updated coloring rules""; ""Important display filters""; ""Malicious traffic analysis""; ""Case study â€? Blackhole exploit kit""; ""Protocols in action""; ""The IP address of the infected box"" 
520 |a If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Quality control. 
650 0 |a Network performance (Telecommunication) 
650 0 |a Computer networks  |x Security measures  |x Computer programs. 
650 6 |a Réseaux d'ordinateurs  |x Qualité  |x Contrôle. 
650 6 |a Performance des réseaux (Télécommunications) 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Logiciels. 
650 7 |a COMPUTERS  |x Networking  |x Network Protocols.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x Viruses & Malware.  |2 bisacsh 
650 7 |a Computer networks  |x Quality control  |2 fast 
650 7 |a Computer networks  |x Security measures  |x Computer programs  |2 fast 
650 7 |a Network performance (Telecommunication)  |2 fast 
776 0 8 |i Print version:  |a Verma, Piyush.  |t Wireshark network security : a succinct guide to securely administer your network using Wireshark.  |d Birmingham, England ; Mumbai, [India] : Packt Publishing, ©2015  |h viii, 117 pages  |z 9781784393335 
830 0 |a Community experience distilled. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1046537  |z Texto completo 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781784393335/?ar  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH29022162 
938 |a EBL - Ebook Library  |b EBLB  |n EBL2120254 
938 |a EBSCOhost  |b EBSC  |n 1046537 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis32252653 
938 |a YBP Library Services  |b YANK  |n 12549510 
994 |a 92  |b IZTAP