In this chapter, we looked at the most common attacks that can occur in a LAN environment and saw how we can use Wireshark's optimum features to detect such attacks. Also, we need to emphasize on baselining for good traffic, in order to better deal with the threats to LAN security, so that any anomaly thereof can be easily detected via Wireshark. Another handy trick is to possess a good list of filters and coloring rules to match them and save the analysis time. We took a brief look at the tools that complement Wireshark very well and used some to solve the CTF challenge at the end.
Wireshark Network Security
By :
Wireshark Network Security
By:
Overview of this book
Table of Contents (14 chapters)
Wireshark Network Security
Credits
About the Author
Acknowledgment
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Getting Started with Wireshark – What, Why, and How?
Tweaking Wireshark
Analyzing Threats to LAN Security
Probing E-mail Communications
Inspecting Malware Traffic
Network Performance Analysis
Index
Customer Reviews