Book Image

Wireshark Network Security

By : Piyush Verma
Book Image

Wireshark Network Security

By: Piyush Verma

Overview of this book

Table of Contents (14 chapters)
Wireshark Network Security
Credits
About the Author
Acknowledgment
About the Reviewers
www.PacktPub.com
Preface
Index

Chapter 2. Tweaking Wireshark

It goes without saying that once you start sniffing on a busy network, you will be flooded with a bulk load of traffic, and in no time you may lose track of what you were looking for and seek assistance. Therefore, it becomes vital to understand the different features that come with the sniffer. This chapter will focus on such features while analyzing multiple trace files using Wireshark. At the end of this chapter, you will be comfortable with:

  • Working with filters in Wireshark

  • Creating multiple profiles

  • Using advanced techniques

  • Performing command-line fu with handy utilities that come prepackaged with Wireshark