Book Image

Wireshark Network Security

By : Piyush Verma
Book Image

Wireshark Network Security

By: Piyush Verma

Overview of this book

Table of Contents (14 chapters)
Wireshark Network Security
Credits
About the Author
Acknowledgment
About the Reviewers
www.PacktPub.com
Preface
Index

Summary


In this chapter, we looked at the most common attacks that can occur in a LAN environment and saw how we can use Wireshark's optimum features to detect such attacks. Also, we need to emphasize on baselining for good traffic, in order to better deal with the threats to LAN security, so that any anomaly thereof can be easily detected via Wireshark. Another handy trick is to possess a good list of filters and coloring rules to match them and save the analysis time. We took a brief look at the tools that complement Wireshark very well and used some to solve the CTF challenge at the end.