In this chapter, we looked at the power of using capture filters in a busy network and how to find our way through a big trace file using display filters or simply splitting it into multiple files for easy navigation. We also created new profiles in Wireshark to help us ease our day-to-day activities and learned how to use the awesome command-line utilities that are shipped with Wireshark. We will be using these as well as the advanced techniques as we move ahead further in this book. In the next chapter, we will analyze threats to LAN security.
Wireshark Network Security
By :
Wireshark Network Security
By:
Overview of this book
Table of Contents (14 chapters)
Wireshark Network Security
Credits
About the Author
Acknowledgment
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Getting Started with Wireshark – What, Why, and How?
Tweaking Wireshark
Analyzing Threats to LAN Security
Probing E-mail Communications
Inspecting Malware Traffic
Network Performance Analysis
Index
Customer Reviews