Use Wireshark to keep your network secure by defending against common forms of infiltration attempts. Analyzing the packets from a security perspective will give you a new insight into how to deal with malicious users.
Activities such as port scanning, footprinting, and various active information gathering attempts are the basis of attacking methodologies that can be taken advantage of to bypass your security infrastructure. Create filters and signatures to identify malicious traffic patterns.
Guessing passwords to gain unauthorized access is called a brute force attack. Through Wireshark, you can filter and identify such malicious forms of traffic.
Wireshark can help you in analyzing malware behavior, and using the behavior analyzed, you would be able to create the necessary signatures for your IDS/IPS security solutions.
The next chapter will enable network professionals to perform wireless packet analysis and teach them how to decrypt and read traffic from the air.