In this chapter, we solved SMTP forensics challenges using Wireshark and learned how to use Wireshark to detect attacks on e-mail communications, when conducted via popular security tools such as Metasploit and Nmap. In the next chapter, we will look at the malicious trace files and learn how to analyze them with the help of Wireshark.
Wireshark Network Security
By :
Wireshark Network Security
By:
Overview of this book
Table of Contents (14 chapters)
Wireshark Network Security
Credits
About the Author
Acknowledgment
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Getting Started with Wireshark – What, Why, and How?
Tweaking Wireshark
Analyzing Threats to LAN Security
Probing E-mail Communications
Inspecting Malware Traffic
Network Performance Analysis
Index
Customer Reviews