Book Image

Mastering Wireshark 2 [Video]

By : Andrew Crouthamel
Book Image

Mastering Wireshark 2 [Video]

By: Andrew Crouthamel

Overview of this book

<p>Wireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form.</p> <p>Through this video, you will gain expertise in securing your network using Wireshark 2. At the start of the video, you will be taught how to install Wireshark, and will be introduced to its interface so you understand all its functionalities. Moving forward, you will discover different ways to create and use capture and display filters. Halfway through the video, you’ll be mastering the features of Wireshark, analyzing different layers of the network protocol, and looking for any anomalies. You will also learn about plugins and APIs.</p> <p>As you reach to the end of the course, you will be taught how to use Wireshark for network security analysis and configure it for troubleshooting purposes.</p> <h1>Style and Approach</h1> <p>This step-by-step tutorial on Wireshark 2 starts with capturing and filtering traffic and follows with analysis and statistics, as well as all the new features of Wireshark 2.</p>
Table of Contents (11 chapters)
Chapter 9
Application Protocol Analysis II
Content Locked
Section 1
Email Analysis
The aim of this video is to learn how to analyze POP and SMTP connections and packet structures. - E-mail uses three main protocols—POP, SMTP, and IMAP. - Encryption is available and more commonly used now. POP and IMAP are falling out of favor as people transition to web mail.