Book Image

Wireshark Network Security

By : Piyush Verma
Book Image

Wireshark Network Security

By: Piyush Verma

Overview of this book

Table of Contents (14 chapters)
Wireshark Network Security
Credits
About the Author
Acknowledgment
About the Reviewers
www.PacktPub.com
Preface
Index

Summary


In this chapter, we learned how to use Wireshark to look for and put together the different pieces of the malware traffic analysis puzzle and also elaborated on IRC botnet-infected communication. In the next chapter, we will look at how to use Wireshark to meet our network performance needs.