没有合适的资源?快使用搜索试试~ 我知道了~
首页Mastering Wireshark 无水印pdf
资源详情
资源评论
资源推荐


MasteringWireshark

TableofContents
MasteringWireshark
Credits
AbouttheAuthor
AbouttheReviewer
www.PacktPub.com
eBooks,discountoffers,andmore
Whysubscribe?
Preface
Whatthisbookcovers
Whatyouneedforthisbook
Whothisbookisfor
Conventions
Readerfeedback
Customersupport
Downloadingthecolorimagesofthisbook
Errata
Piracy
Questions
1.WelcometotheWorldofPacketAnalysiswithWireshark
IntroductiontoWireshark
AbriefoverviewoftheTCP/IPmodel
ThelayersintheTCP/IPmodel
AnintroductiontopacketanalysiswithWireshark
Howtodopacketanalysis
WhatisWireshark?
Howitworks
Capturingmethodologies
Hub-basednetworks
Theswitchedenvironment
ARPpoisoning
Passingthroughrouters
WhyuseWireshark?
TheWiresharkGUI
Theinstallationprocess
Startingourfirstcapture
Summary
Practicequestions
2.FilteringOurWayinWireshark
Anintroductiontofilters

Capturefilters
Whyusecapturefilters
Howtousecapturefilters
Anexamplecapturefilter
Capturefiltersthatuseprotocolheadervalues
Displayfilters
Retainingfiltersforlateruse
SearchingforpacketsusingtheFinddialog
Colorizetraffic
CreatenewWiresharkprofiles
Summary
Practicequestions
3.MasteringtheAdvancedFeaturesofWireshark
TheStatisticsmenu
UsingtheStatisticsmenu
ProtocolHierarchy
Conversations
Endpoints
WorkingwithIO,Flow,andTCPstreamgraphs
IOgraphs
Flowgraphs
TCPstreamgraphs
Round-triptimegraphs
Throughputgraphs
TheTime-sequencegraph(tcptrace)
FollowTCPstreams
ExpertInfos
CommandLine-fu
Summary
Exercise
4.InspectingApplicationLayerProtocols
Domainnamesystem
DissectingaDNSpacket
DissectingDNSquery/response
UnusualDNStraffic
Filetransferprotocol
DissectingFTPcommunications
Passivemode
Activemode
DissectingFTPpackets
UnusualFTP
HyperTextTransferProtocol
Howitworks–request/response
Request

Response
UnusualHTTPtraffic
SimpleMailTransferProtocol
UsualversusunusualSMTPtraffic
SessionInitiationProtocolandVoiceOverInternetProtocol
AnalyzingVOIPtraffic
Reassemblingpacketsforplayback
Unusualtrafficpatterns
Decryptingencryptedtraffic(SSL/TLS)
Summary
Practicequestions:
5.AnalyzingTransportLayerProtocols
Thetransmissioncontrolprotocol
UnderstandingtheTCPheaderanditsvariousflags
HowTCPcommunicates
Howitworks
Gracefultermination
RST(reset)packets
RelativeversesAbsolutenumbers
UnusualTCPtraffic
HowtocheckfordifferentanalysisflagsinWireshark
TheUserDatagramProtocol
AUDPheader
Howitworks
TheDHCP
TheTFTP
UnusualUDPtraffic
Summary
Practicequestions
6.AnalyzingTrafficinThinAir
UnderstandingIEEE802.11
Variousmodesinwirelesscommunications
Wirelessinterferenceandstrength
TheIEEE802.11packetstructure
RTS/CTS
UsualandunusualWEP–open/sharedkeycommunication
WEP-openkey
Thesharedkey
WPA-Personal
WPA-Enterprise
DecryptingWEPandWPAtraffic
Summary
Practicequestions
7.NetworkSecurityAnalysis
剩余365页未读,继续阅读
















安全验证
文档复制为VIP权益,开通VIP直接复制

评论0