Book Image

Learn Wireshark, - Second Edition

By : Lisa Bock
5 (1)
Book Image

Learn Wireshark, - Second Edition

5 (1)
By: Lisa Bock

Overview of this book

Wireshark is a popular and powerful packet analysis tool that helps network administrators investigate latency issues and potential attacks. Over the years, there have been many enhancements to Wireshark’s functionality. This book will guide you through essential features so you can capture, display, and filter data with ease. In addition to this, you’ll gain valuable tips on lesser-known configuration options, which will allow you to complete your analysis in an environment customized to suit your needs. This updated second edition of Learn Wireshark starts by outlining the benefits of traffic analysis. You’ll discover the process of installing Wireshark and become more familiar with the interface. Next, you’ll focus on the Internet Suite and then explore deep packet analysis of common protocols such as DNS, DHCP, HTTP, and ARP. The book also guides you through working with the expert system to detect network latency issues, create I/O and stream graphs, subset traffic, and save and export captures. Finally, you’ll understand how to share captures using CloudShark, a browser-based solution for analyzing packet captures. By the end of this Wireshark book, you’ll have the skills and hands-on experience you need to conduct deep packet analysis of common protocols and network troubleshooting as well as identify security issues.
Table of Contents (28 chapters)
1
Part 1 Traffic Capture Overview
6
Part 2 Getting Started with Wireshark
11
Part 3 The Internet Suite TCP/IP
16
Part 4 Deep Packet Analysis of Common Protocols
21
Part 5 Working with Packet Captures

Questions

Now it's time to check your knowledge. Select the best response, and then check your answers, which can be found in the Assessments appendix:

  1. To filter only in packets that you have marked in Wireshark, use _____ in the display filter.
    1. marked:all
    2. frame = black
    3. frame.marked==1
    4. marked: on
  2. ____ is used to increase the maximum WS that is allowed.
    1. NOP
    2. Window scale
    3. Timestamp
    4. SACK
  3. When using _____, the receiver will notify the sender if there are any missing packets.
    1. NOP
    2. Window scale
    3. Timestamp
    4. SACK
  4. TCP ends the session by exchanging packets indicating that each side should close their respective socket. TCP uses the _____ flag to indicate the end of a conversation.
    1. END
    2. SYN
    3. FIN
    4. URG
  5. If, in the TCP header, the sequence number is 1 and the next sequence number is 937, the packet has _____ bytes of data.
    1. 32
    2. 380
    3. 936
    4. 33,304
  6. When using TCP options, _____ is a single byte used at the end of the options.
    1. EOL
    2. SACK
    3. NOP
    4. WS
  7. Using the _____ option, TCP can monitor the round-trip...