Tabla de Contenidos:
  • Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Welcome to the World of Packet Analysis with Wireshark; Introduction to Wireshark; A brief overview of the TCP/IP model; The layers in the TCP/IP model; An introduction to packet analysis with Wireshark; How to do packet analysis; What is Wireshark?; How it works; Capturing methodologies; Hub-based networks; The switched environment; ARP poisoning; Passing through routers; Why use Wireshark?; The Wireshark GUI; The installation process; Starting our first capture
  • Working with IO, Flow, and TCP stream graphsIO graphs; Flow graphs; TCP stream graphs; Round-trip time graphs; Throughput graphs; The Time-sequence graph (tcptrace); Follow TCP streams; Expert Infos; Command Line-fu; Summary; Exercise; Chapter 4: Inspecting Application Layer Protocols; Domain name system; Dissecting a DNS packet; Dissecting DNS query/response; Unusual DNS traffic; File transfer protocol; Dissecting FTP communications; Passive mode; Active mode; Dissecting FTP packets; Unusual FTP; Hyper Text Transfer Protocol; How it works
  • request/response; Request; Response
  • Unusual HTTP trafficSimple Mail Transfer Protocol; Usual versus unusual SMTP traffic; Session Initiation Protocol and Voice Over Internet Protocol; Analyzing VOIP traffic; Reassembling packets for playback; Unusual traffic patterns; Decrypting encrypted traffic (SSL/TLS); Summary; Practice questions:; Chapter 5: Analyzing Transport Layer Protocols; The transmission control protocol; Understanding the TCP header and its various flags; How TCP communicates; How it works; Graceful termination; RST (reset) packets; Relative verses Absolute numbers; Unusual TCP traffic
  • How to check for different analysis flags in WiresharkThe User Datagram Protocol; A UDP header; How it works; The DHCP; The TFTP; Unusual UDP traffic; Summary; Practice questions; Chapter 6: Analyzing Traffic in Thin Air; Understanding IEEE 802.11; Various modes in wireless communications; Wireless interference and strength; The IEEE 802.11 packet structure; RTS/CTS; Usual and unusual WEP
  • open/shared key communication; WEP-open key; The shared key; WPA-Personal; WPA-Enterprise; Decrypting WEP and WPA traffic; Summary; Practice questions; Chapter 7: Network Security Analysis