Wireshark for Security Professionals Using Wireshark and the Metasploit Framework 1st edition by Jessey Bullock, Jeff Parker – Ebook PDF Instant Download/Delivery.9781118918227, 1118918223
Full download Wireshark for Security Professionals Using Wireshark and the Metasploit Framework 1st edition after payment
Product details:
ISBN 10: 1118918223
ISBN 13: 9781118918227
Author: Jessey Bullock; Jeff T. Parker
If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment.
Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples.
Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material.
Wireshark for Security Professionals Using Wireshark and the Metasploit Framework 1st Table of contents:
Chapter 1: Introducing Wireshark
- What Is Wireshark?
- The Wireshark User Interface
- Filters
- Summary
- Exercises
Chapter 2: Setting Up the Lab
- Kali Linux
- Virtualization
- VirtualBox
- The W4SP Lab
- Summary
- Exercises
Chapter 3: The Fundamentals
- Networking
- Security
- Packet and Protocol Analysis
- Summary
- Exercises
Chapter 4: Capturing Packets
- Sniffing
- Dealing with the Network
- Loading and Saving Capture Files
- Dissectors
- Viewing Someone Else’s Captures
- Summary
- Exercises
Chapter 5: Diagnosing Attacks
- Attack Type: Man-in-the-Middle
- Attack Type: Denial of Service
- Attack Type: Advanced Persistent Threat
- Summary
- Exercises
Chapter 6: Offensive Wireshark
- Attack Methodology
- Reconnaissance Using Wireshark
- Evading IPS/IDS
- Exploitation
- Remote Capture over SSH
- Summary
- Exercises
Chapter 7: Decrypting TLS, Capturing USB, Keyloggers, and Network Graphing
- Decrypting SSL/TLS
- USB and Wireshark
- Graphing the Network
- Summary
- Exercises
Chapter 8: Scripting with Lua
- Why Lua?
- Scripting Basics
- Setup
- Tools
- Creating Dissectors for Wireshark
- Extending Wireshark
- Summary
People also search for Wireshark for Security Professionals Using Wireshark and the Metasploit Framework 1st :
is wireshark a security risk
is it illegal to use wireshark
wireshark for security professionals
wireshark security tool