Index
A
- Address Resolution Protocol (ARP) / The layers in the TCP/IP model
- Application Layer / The layers in the TCP/IP model
- ARP poisoning / ARP poisoning, ARP poisoning
- authentication packets / Usual and unusual wireless traffic
B
- Base Service Set Identifier (BSSID) / Various modes in wireless communications
- Berkley Packet Filter (BPF) / Capture filters, How to use capture filters
- brute force attacks
- analysing / Analysing brute force attacks
- malicious traffic, inspecting / Inspecting malicious traffic (malware)
C
- capture filters
- about / Capture filters
- usage, determining / Why use capture filters
- using / How to use capture filters
- example / An example capture filter
- display filters / Display filters
- retaining / Retaining filters for later use
- Carrier Sense Multiple Access and Collision Avoidance (CSMA/CA) / Various modes in wireless communications
- colorization / Colorize traffic
D
- display filters / Display filters
- domain name system (DNS)
- about / Domain Name System (DNS)
- packet, dissecting / Dissecting a DNS packet
- query/response, dissecting / Dissecting DNS query/response
- Dynamic Host Configuration Protocol (DHCP) / The DHCP
E
- encrypted traffic
- decrypting / Decrypting encrypted traffic (SSL/TLS)
F
- file transfer protocol (FTP)
- about / File transfer protocol
- communication packets, dissecting / Dissecting FTP communication packets
- filters / Introducing filters
G
- Graphical Toolkit (GTK) / How to do packet analysis
H
- half-open scan (SYN) / Half-open scan (SYN)
- hub-based networks / Hub-based networks
- hubbing out / The switched environment
- hyper text transfer protocol (HTTP)
- about / Hypertext Transfer Protocol (HTTP)
- request/response, working / How request/response works
- request / Request
- response / Response
I
- ICS (industrial control system) / The Wireshark GUI
- IEEE 802.11
- about / Understanding IEEE 802.11
- 802.11b / Understanding IEEE 802.11
- 802.11a / Understanding IEEE 802.11
- 802.11g / Understanding IEEE 802.11
- 802.11n / Understanding IEEE 802.11
- wireless communications modes / Various modes in wireless communications
- Basic Service Set (BSS) / Various modes in wireless communications
- station (STA) / Various modes in wireless communications
- wireless Access Point (AP) / Various modes in wireless communications
- Extended Service Set (ESS) / Various modes in wireless communications
- Independent Basic service set (IBSS) / Various modes in wireless communications
- Distribution System (DS) / Various modes in wireless communications
- information gathering
- about / Information gathering
- ING sweep / PING sweep
- half-open scan / Half-open scan (SYN)
- OS fingerprinting / OS fingerprinting
- Initial Sequence Numbers (ISN) / How sequence numbers are generated and managed
- Institute of Electrical and Electronics Engineers (IEEE) / Understanding IEEE 802.11
- Internet Layer / The layers in the TCP/IP model
- IP (Internet Protocol) / The layers in the TCP/IP model
L
- Link Layer / The layers in the TCP/IP model
- local area network (LAN) / The layers in the TCP/IP model, Understanding IEEE 802.11
M
- malicious traffic (malware)
- inspecting / Inspecting malicious traffic (malware)
- maximum segment size (MSS) / Understanding the TCP header and its various flags
- Message integrity check (MIC) / Usual and unusual wireless traffic
- methodologies
- capturing / Capturing methodologies
- switched environment / The switched environment
- ARP poisoning / ARP poisoning
- routers, passing through / Passing through routers
- Wireshark GUI / The Wireshark GUI
- capture, starting / Starting our first capture
- Multiple-Input Multiple-output (MIMO) / Understanding IEEE 802.11
O
- Orthogonal Frequency Division Multiplexing (OFDM) / Understanding IEEE 802.11
- OS fingerprinting / OS fingerprinting
P
- packet analysis
- with Wireshark / An introduction to packet analysis with Wireshark
- working / How to do packet analysis
- packets
- searching, with Find dialog / Retaining filters for later use
- traffic colorization / Colorize traffic
- Pairwise Transient Key (PTK) / Usual and unusual wireless traffic
- PING sweep / PING sweep
- Point to Point Protocol(PPP) / The layers in the TCP/IP model
- Pre-Shared Key (PSK) / Usual and unusual wireless traffic
- protocol data unit (PDU) / The layers in the TCP/IP model
- Protocol Hierarchy / Protocol Hierarchy
R
- Radio Frequency Monitor Mode (RFMON) / Various modes in wireless communications
- Real time transport protocol (RTP) / Session Initiation Protocol (SIP) and Voice Over Internet Protocol(VOIP)
- Receive Sequence Counter (RSC) / Usual and unusual wireless traffic
- routers
- passing / Passing through routers
S
- Service Set Identifier (SSID) / Various modes in wireless communications
- session initiation protocol / Session Initiation Protocol (SIP) and Voice Over Internet Protocol(VOIP)
- simple mail transfer protocol (SMTP)
- about / Simple Mail Transfer Protocol (SMTP)
- communication packets, dissecting / Dissecting SMTP communication packets
- voice over internet protocol / Session Initiation Protocol (SIP) and Voice Over Internet Protocol(VOIP)
- packets, reassembling for playback / Reassembling packets for playback
- encrypted traffic (SSL/TLS), decrypting / Decrypting encrypted traffic (SSL/TLS)
- Statistics menu
- about / The Statistics menu
- using / Using the Statistics menu
- protocol hierarchy / Protocol Hierarchy
- conversations / Conversations
- endpoints / Endpoints
- TCP streams, following / Follow TCP Streams
- command line / Command line-fu
- switched environment / The switched environment
T
- TCP/IP model
- overview / A brief overview of the TCP/IP model
- layers / The layers in the TCP/IP model
- TCP flags
- SYN (synchronize) / Understanding the TCP header and its various flags
- ACK (acknowledgement) / Understanding the TCP header and its various flags
- RST (reset) / Understanding the TCP header and its various flags
- FIN (finish) / Understanding the TCP header and its various flags
- PSH (push) / Understanding the TCP header and its various flags
- URG (urgent) / Understanding the TCP header and its various flags
- CWR (congestion window reduced) / Understanding the TCP header and its various flags
- TCP header fields / Understanding the TCP header and its various flags
- source port / Understanding the TCP header and its various flags
- destination port / Understanding the TCP header and its various flags
- data offset / Understanding the TCP header and its various flags
- flags / Understanding the TCP header and its various flags
- Three-Way Handshake process / The transmission control protocol
- transmission control protocol (TCP)
- about / The layers in the TCP/IP model, The transmission control protocol
- header / Understanding the TCP header and its various flags
- flags / Understanding the TCP header and its various flags
- communication / How TCP communicates
- communication, working / How it works
- sequence number, generating / How sequence numbers are generated and managed
- sequence numbers, managing / How sequence numbers are generated and managed
- RST (reset) packets / RST (reset) packets
- unusual TCP traffic / Unusual TCP traffic
- Trivial File Transfer Protocol (TFTP) / The TFTP
U
- uniform resource locator (url) / Request
- User Datagram Protocol (UDP)
- about / The layers in the TCP/IP model, The User Datagram Protocol
- header / The UDP header
- working / How it works
- DHCP / The DHCP
- TFTP / The TFTP
- unusual UDP traffic / Unusual UDP traffic
V
- voice over internet protocol / Session Initiation Protocol (SIP) and Voice Over Internet Protocol(VOIP)
W
- Wi-Fi Protected Access (WPA) / Usual and unusual wireless traffic
- wireless communications modes
- about / Various modes in wireless communications
- infrastructure/managed mode / Various modes in wireless communications
- Ad Hoc mode / Various modes in wireless communications
- master mode / Various modes in wireless communications
- monitor mode / Various modes in wireless communications
- wireless network traffic
- decrypting / Decrypting wireless network traffic
- Wireshark
- about / Introduction to Wireshark, What is Wireshark?
- using / Why use Wireshark?
- installation process / The installation process
- installation errors, troubleshooting / Troubleshooting common installation errors
- URL / What is Wireshark?
- working / How Wireshark works
- packet analysis / An introduction to packet analysis with Wireshark
- Wireshark GUI / The Wireshark GUI
- Wireshark profiles
- creating / Create new Wireshark profiles
- WPA Enterprise / WPA Enterprise