Mastering Wireshark

Analyze data network like a professional by mastering Wireshark - From 0 to 1337

Mastering Wireshark

This ebook is included in a Mapt subscription
Charit Mishra

3 customer reviews
Analyze data network like a professional by mastering Wireshark - From 0 to 1337
$10.00
$49.99
RRP $39.99
RRP $49.99
eBook
Print + eBook
Code Files
Preview in Mapt

Book Details

ISBN 139781783989522
Paperback308 pages

Book Description

Wireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form.

Mastering Wireshark will help you raise your knowledge to an expert level. At the start of the book, you will be taught how to install Wireshark, and will be introduced to its interface so you understand all its functionalities. Moving forward, you will discover different ways to create and use capture and display filters. Halfway through the book, you’ll be mastering the features of Wireshark, analyzing different layers of the network protocol, looking for any anomalies. As you reach to the end of the book, you will be taught how to use Wireshark for network security analysis and configure it for troubleshooting purposes.

Table of Contents

Chapter 1: Welcome to the World of Packet Analysis with Wireshark
Introduction to Wireshark
A brief overview of the TCP/IP model
The layers in the TCP/IP model
An introduction to packet analysis with Wireshark
Capturing methodologies
Summary
Practice questions
Chapter 2: Filtering Our Way in Wireshark
An introduction to filters
Capture filters
Display filters
Searching for packets using the Find dialog
Create new Wireshark profiles
Summary
Practice questions
Chapter 3: Mastering the Advanced Features of Wireshark
The Statistics menu
Conversations
Endpoints
Working with IO, Flow, and TCP stream graphs
IO graphs
Flow graphs
TCP stream graphs
Follow TCP streams
Expert Infos
Command Line-fu
Summary
Exercise
Chapter 4: Inspecting Application Layer Protocols
Domain name system
File transfer protocol
Hyper Text Transfer Protocol
Simple Mail Transfer Protocol
Summary
Practice questions:
Chapter 5: Analyzing Transport Layer Protocols
The transmission control protocol
The User Datagram Protocol
Summary
Practice questions
Chapter 6: Analyzing Traffic in Thin Air
Understanding IEEE 802.11
Usual and unusual WEP – open/shared key communication
Decrypting WEP and WPA traffic
Summary
Practice questions
Chapter 7: Network Security Analysis
Information gathering
ARP poisoning
Analyzing brute force attacks
Summary
Practice questions
Chapter 8: Troubleshooting
Recovery features
Summary
Practice questions
Chapter 9: Introduction to Wireshark v2
The intelligent scroll bar
Translation
Graph improvements
TCP streams
USBPcap
Summary
Practice questions

What You Will Learn

  • Install Wireshark and understand its GUI and all the functionalities of it
  • Create and use different filters
  • Analyze different layers of network protocols and know the amount of packets that flow through the network
  • Decrypt encrypted wireless traffic
  • Use Wireshark as a diagnostic tool and also for network security analysis to keep track of malware
  • Troubleshoot all the network anomalies with help of Wireshark 
  • Resolve latencies and bottleneck issues in the network

Authors

Table of Contents

Chapter 1: Welcome to the World of Packet Analysis with Wireshark
Introduction to Wireshark
A brief overview of the TCP/IP model
The layers in the TCP/IP model
An introduction to packet analysis with Wireshark
Capturing methodologies
Summary
Practice questions
Chapter 2: Filtering Our Way in Wireshark
An introduction to filters
Capture filters
Display filters
Searching for packets using the Find dialog
Create new Wireshark profiles
Summary
Practice questions
Chapter 3: Mastering the Advanced Features of Wireshark
The Statistics menu
Conversations
Endpoints
Working with IO, Flow, and TCP stream graphs
IO graphs
Flow graphs
TCP stream graphs
Follow TCP streams
Expert Infos
Command Line-fu
Summary
Exercise
Chapter 4: Inspecting Application Layer Protocols
Domain name system
File transfer protocol
Hyper Text Transfer Protocol
Simple Mail Transfer Protocol
Summary
Practice questions:
Chapter 5: Analyzing Transport Layer Protocols
The transmission control protocol
The User Datagram Protocol
Summary
Practice questions
Chapter 6: Analyzing Traffic in Thin Air
Understanding IEEE 802.11
Usual and unusual WEP – open/shared key communication
Decrypting WEP and WPA traffic
Summary
Practice questions
Chapter 7: Network Security Analysis
Information gathering
ARP poisoning
Analyzing brute force attacks
Summary
Practice questions
Chapter 8: Troubleshooting
Recovery features
Summary
Practice questions
Chapter 9: Introduction to Wireshark v2
The intelligent scroll bar
Translation
Graph improvements
TCP streams
USBPcap
Summary
Practice questions

Book Details

ISBN 139781783989522
Paperback308 pages
Read More
From 3 reviews

Read More Reviews