Mastering Wireshark : analyze data network like a professional by mastering Wireshark, from 0 to 1337 /
Annotation
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham, UK :
Packt Publishing,
2016.
|
Colección: | Community experience distilled.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000Ii 4500 | ||
---|---|---|---|
001 | EBSCO_ocn946526530 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 160412t20162016enka o 001 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d YDXCP |d IDEBK |d KSU |d DEBSZ |d DEBBG |d C6I |d OCLCQ |d OCLCF |d CEF |d YDX |d N$T |d AGLDB |d IGB |d RDF |d UKMGB |d OCLCO |d OCLCQ |d OCLCO | ||
015 | |a GBC1I7403 |2 bnb | ||
016 | 7 | |a 018007117 |2 Uk | |
019 | |a 946006576 |a 946106464 | ||
020 | |a 178398953X |q electronic book | ||
020 | |a 9781783989539 |q (electronic bk.) | ||
020 | |z 9781783989522 | ||
020 | |z 1783989521 | ||
029 | 1 | |a DEBSZ |b 480365083 | |
029 | 1 | |a DEBBG |b BV043969192 | |
029 | 1 | |a DEBSZ |b 485797062 | |
029 | 1 | |a GBVCP |b 882754599 | |
029 | 1 | |a AU@ |b 000067090324 | |
029 | 1 | |a UKMGB |b 018007117 | |
035 | |a (OCoLC)946526530 |z (OCoLC)946006576 |z (OCoLC)946106464 | ||
037 | |a CL0500000732 |b Safari Books Online | ||
050 | 4 | |a TK5105.55 |b .M57 2016 | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
082 | 0 | 4 | |a 004.6/2 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Mishra, Charit, |e author. | |
245 | 1 | 0 | |a Mastering Wireshark : |b analyze data network like a professional by mastering Wireshark, from 0 to 1337 / |c Charit Mishra. |
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2016. | |
264 | 4 | |c ©2016 | |
300 | |a 1 online resource (ix, 291 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Community experience distilled | |
500 | |a Includes index. | ||
520 | 8 | |a Annotation |b Analyze data network like a professional by mastering Wireshark - From 0 to 1337About This Book Master Wireshark and train it as your network sniffer Impress your peers and get yourself pronounced as a network doctor Understand Wireshark and its numerous features with the aid of this fast-paced book packed with numerous screenshots, and become a pro at resolving network anomaliesWho This Book Is ForAre you curious to know what's going on in a network? Do you get frustrated when you are unable to detect the cause of problems in your networks? This is where the book comes into play.Mastering Wireshark is for developers or network enthusiasts who are interested in understanding the internal workings of networks and have prior knowledge of using Wireshark, but are not aware about all of its functionalities.What You Will Learn Install Wireshark and understand its GUI and all the functionalities of it Create and use different filters Analyze different layers of network protocols and know the amount of packets that flow through the network Decrypt encrypted wireless traffic Use Wireshark as a diagnostic tool and also for network security analysis to keep track of malware Troubleshoot all the network anomalies with help of Wireshark Resolve latencies and bottleneck issues in the networkIn DetailWireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form.Mastering Wireshark will help you raise your knowledge to an expert level. At the start of the book, you will be taught how to install Wireshark, and will be introduced to its interface so you understand all its functionalities. Moving forward, you will discover different ways to create and use capture and display filters. Halfway through the book, you'll be mastering the features of Wireshark, analyzing different layers of the network protocol, looking for any anomalies. As you reach to the end of the book, you will be taught how to use Wireshark for network security analysis and configure it for troubleshooting purposes.Style and approach Every chapter in this book is explained to you in an easy way accompanied by real-life examples and screenshots of the interface, making it easy for you to become an expert at using Wireshark. | |
588 | |a Description based on online resource; title from digital title page (viewed on August 14, 2018). | ||
505 | 0 | |a Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Welcome to the World of Packet Analysis with Wireshark; Introduction to Wireshark; A brief overview of the TCP/IP model; The layers in the TCP/IP model; An introduction to packet analysis with Wireshark; How to do packet analysis; What is Wireshark?; How it works; Capturing methodologies; Hub-based networks; The switched environment; ARP poisoning; Passing through routers; Why use Wireshark?; The Wireshark GUI; The installation process; Starting our first capture | |
505 | 8 | |a Working with IO, Flow, and TCP stream graphsIO graphs; Flow graphs; TCP stream graphs; Round-trip time graphs; Throughput graphs; The Time-sequence graph (tcptrace); Follow TCP streams; Expert Infos; Command Line-fu; Summary; Exercise; Chapter 4: Inspecting Application Layer Protocols; Domain name system; Dissecting a DNS packet; Dissecting DNS query/response; Unusual DNS traffic; File transfer protocol; Dissecting FTP communications; Passive mode; Active mode; Dissecting FTP packets; Unusual FTP; Hyper Text Transfer Protocol; How it works -- request/response; Request; Response | |
505 | 8 | |a Unusual HTTP trafficSimple Mail Transfer Protocol; Usual versus unusual SMTP traffic; Session Initiation Protocol and Voice Over Internet Protocol; Analyzing VOIP traffic; Reassembling packets for playback; Unusual traffic patterns; Decrypting encrypted traffic (SSL/TLS); Summary; Practice questions:; Chapter 5: Analyzing Transport Layer Protocols; The transmission control protocol; Understanding the TCP header and its various flags; How TCP communicates; How it works; Graceful termination; RST (reset) packets; Relative verses Absolute numbers; Unusual TCP traffic | |
505 | 8 | |a How to check for different analysis flags in WiresharkThe User Datagram Protocol; A UDP header; How it works; The DHCP; The TFTP; Unusual UDP traffic; Summary; Practice questions; Chapter 6: Analyzing Traffic in Thin Air; Understanding IEEE 802.11; Various modes in wireless communications; Wireless interference and strength; The IEEE 802.11 packet structure; RTS/CTS; Usual and unusual WEP -- open/shared key communication; WEP-open key; The shared key; WPA-Personal; WPA-Enterprise; Decrypting WEP and WPA traffic; Summary; Practice questions; Chapter 7: Network Security Analysis | |
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
650 | 0 | |a Computer network protocols. | |
650 | 0 | |a Packet switching (Data transmission) | |
650 | 0 | |a Computer networks |x Monitoring. | |
650 | 0 | |a Packet transport networks. | |
650 | 6 | |a Protocoles de réseaux d'ordinateurs. | |
650 | 6 | |a Commutation de paquets. | |
650 | 6 | |a Réseaux d'ordinateurs |x Surveillance. | |
650 | 7 | |a COMPUTERS / Computer Literacy |2 bisacsh | |
650 | 7 | |a COMPUTERS / Computer Science |2 bisacsh | |
650 | 7 | |a COMPUTERS / Data Processing |2 bisacsh | |
650 | 7 | |a COMPUTERS / Hardware / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / Machine Theory |2 bisacsh | |
650 | 7 | |a COMPUTERS / Reference |2 bisacsh | |
650 | 7 | |a Computer network protocols |2 fast | |
650 | 7 | |a Computer networks |x Monitoring |2 fast | |
650 | 7 | |a Packet switching (Data transmission) |2 fast | |
650 | 7 | |a Packet transport networks |2 fast | |
830 | 0 | |a Community experience distilled. | |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781783989522/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1214598 |z Texto completo |
938 | |a YBP Library Services |b YANK |n 12925501 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis34330418 | ||
938 | |a EBSCOhost |b EBSC |n 1214598 | ||
994 | |a 92 |b IZTAP |