Book Image

Wireshark Network Security

By : Piyush Verma
Book Image

Wireshark Network Security

By: Piyush Verma

Overview of this book

Table of Contents (14 chapters)
Wireshark Network Security
Credits
About the Author
Acknowledgment
About the Reviewers
www.PacktPub.com
Preface
Index

Summary


In this chapter, we solved SMTP forensics challenges using Wireshark and learned how to use Wireshark to detect attacks on e-mail communications, when conducted via popular security tools such as Metasploit and Nmap. In the next chapter, we will look at the malicious trace files and learn how to analyze them with the help of Wireshark.