Book Image

Wireshark Network Security

By : Piyush Verma
Book Image

Wireshark Network Security

By: Piyush Verma

Overview of this book

Table of Contents (14 chapters)
Wireshark Network Security
Credits
About the Author
Acknowledgment
About the Reviewers
www.PacktPub.com
Preface
Index

Chapter 4. Probing E-mail Communications

Messages have been exchanged since centuries; however, the means to exchange these messages have evolved, and privacy has become a bigger and more important concern than ever before. From the time when messengers were used to deliver messages physically to the recent times when the Internet is used to deliver messages, the vulnerabilities have existed and are not completely fixed, even today. In this chapter, we will look at a contemporary way of messaging, that is e-mails, and the security threats it brings to the table.

In this chapter we will learn the following:

  • How to use Wireshark to detect numerous attacks on SMTP

  • Solve SMTP forensics challenges using Wireshark and a bit of Python

  • Important filters to detect unusual SMTP traffic

In the 1960s, we were introduced to electronic mail (e-mail), and since then it has become the de facto standard to exchange messages over the Internet whether casually or professionally. The protocols used in such communications...