Image from Google Jackets
Normal view MARC view

Practical packet analysis : using Wireshark to solve real-world network problems / by Chris Sanders.

By: Publication details: San Francisco : No Starch Press, c2011.Edition: 2nd edDescription: xx, 255 p. : ill. ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781593272661 (pbk.) :
  • 1593272669 (pbk.) :
Subject(s): LOC classification:
  • TK5105.55 .S265 2011
Contents:
Introduction -- Why This Book? -- Concepts and Approach -- How to Use This Book -- About the Sample Capture Files -- The Rural Technology Fund -- Contacting Me -- Chapter 1: Packet Analysis and Network Basics -- 1.1 Packet Analysis and Packet Sniffers -- 1.2 How Computers Communicate -- 1.3 Traffic Classifications -- 1.4 Final Thoughts -- Chapter 2: Tapping into the Wire -- 2.1 Living Promiscuously -- 2.2 Sniffing Around Hubs -- 2.3 Sniffing in a Switched Environment -- 2.4 Sniffing in a Routed Environment -- 2.5 Sniffer Placement in Practice -- Chapter 3: Introduction to Wireshark -- 3.1 A Brief History of Wireshark -- 3.2 The Benefits of Wireshark -- 3.3 Installing Wireshark -- 3.4 Wireshark Fundamentals -- Chapter 4: Working with Captured Packets -- 4.1 Working with Capture Files -- 4.2 Working with Packets -- 4.3 Setting Time Display Formats and References -- 4.4 Setting Capture Options -- 4.5 Using Filters -- Chapter 5: Advanced Wireshark Features -- 5.1 Network Endpoints and Conversations -- 5.2 Protocol Hierarchy Statistics -- 5.3 Name Resolution -- 5.4 Protocol Dissection -- 5.5 Following TCP Streams -- 5.6 Packet Lengths -- 5.7 Graphing -- 5.8 Expert Information -- Chapter 6: Common Lower-Layer Protocols -- 6.1 Address Resolution Protocol -- 6.2 Internet Protocol -- 6.3 Transmission Control Protocol -- 6.4 User Datagram Protocol -- 6.5 Internet Control Message Protocol -- Chapter 7: Common Upper-Layer Protocols -- 7.1 Dynamic Host Configuration Protocol -- 7.2 Domain Name System -- 7.3 Hypertext Transfer Protocol -- 7.4 Final Thoughts -- Chapter 8: Basic Real-World Scenarios -- 8.1 Social Networking at the Packet Level -- 8.2 Capturing ESPN.com Traffic -- 8.3 Real-World Problems -- 8.4 Final Thoughts -- Chapter 9: Fighting a Slow Network -- 9.1 TCP Error-Recovery Features -- 9.2 TCP Flow Control -- 9.3 Learning from TCP Error-Control and Flow-Control Packets -- 9.4 Locating the Source of High Latency -- 9.5 Network Baselining -- 9.6 Final Thoughts -- Chapter 10: Packet Analysis for Security -- 10.1 Reconnaissance -- 10.2 Exploitation -- 10.3 Final Thoughts -- Chapter 11: Wireless Packet Analysis -- 11.1 Physical Considerations -- 11.2 Wireless Card Modes -- 11.3 Sniffing Wirelessly in Windows -- 11.4 Sniffing Wirelessly in Linux -- 11.5 802.11 Packet Structure -- 11.6 Adding Wireless-Specific Columns to the Packet List Pane -- 11.7 Wireless-Specific Filters -- 11.8 Wireless Security -- 11.9 Final Thoughts.

Introduction -- Why This Book? -- Concepts and Approach -- How to Use This Book -- About the Sample Capture Files -- The Rural Technology Fund -- Contacting Me -- Chapter 1: Packet Analysis and Network Basics -- 1.1 Packet Analysis and Packet Sniffers -- 1.2 How Computers Communicate -- 1.3 Traffic Classifications -- 1.4 Final Thoughts -- Chapter 2: Tapping into the Wire -- 2.1 Living Promiscuously -- 2.2 Sniffing Around Hubs -- 2.3 Sniffing in a Switched Environment -- 2.4 Sniffing in a Routed Environment -- 2.5 Sniffer Placement in Practice -- Chapter 3: Introduction to Wireshark -- 3.1 A Brief History of Wireshark -- 3.2 The Benefits of Wireshark -- 3.3 Installing Wireshark -- 3.4 Wireshark Fundamentals -- Chapter 4: Working with Captured Packets -- 4.1 Working with Capture Files -- 4.2 Working with Packets -- 4.3 Setting Time Display Formats and References -- 4.4 Setting Capture Options -- 4.5 Using Filters -- Chapter 5: Advanced Wireshark Features -- 5.1 Network Endpoints and Conversations -- 5.2 Protocol Hierarchy Statistics -- 5.3 Name Resolution -- 5.4 Protocol Dissection -- 5.5 Following TCP Streams -- 5.6 Packet Lengths -- 5.7 Graphing -- 5.8 Expert Information -- Chapter 6: Common Lower-Layer Protocols -- 6.1 Address Resolution Protocol -- 6.2 Internet Protocol -- 6.3 Transmission Control Protocol -- 6.4 User Datagram Protocol -- 6.5 Internet Control Message Protocol -- Chapter 7: Common Upper-Layer Protocols -- 7.1 Dynamic Host Configuration Protocol -- 7.2 Domain Name System -- 7.3 Hypertext Transfer Protocol -- 7.4 Final Thoughts -- Chapter 8: Basic Real-World Scenarios -- 8.1 Social Networking at the Packet Level -- 8.2 Capturing ESPN.com Traffic -- 8.3 Real-World Problems -- 8.4 Final Thoughts -- Chapter 9: Fighting a Slow Network -- 9.1 TCP Error-Recovery Features -- 9.2 TCP Flow Control -- 9.3 Learning from TCP Error-Control and Flow-Control Packets -- 9.4 Locating the Source of High Latency -- 9.5 Network Baselining -- 9.6 Final Thoughts -- Chapter 10: Packet Analysis for Security -- 10.1 Reconnaissance -- 10.2 Exploitation -- 10.3 Final Thoughts -- Chapter 11: Wireless Packet Analysis -- 11.1 Physical Considerations -- 11.2 Wireless Card Modes -- 11.3 Sniffing Wirelessly in Windows -- 11.4 Sniffing Wirelessly in Linux -- 11.5 802.11 Packet Structure -- 11.6 Adding Wireless-Specific Columns to the Packet List Pane -- 11.7 Wireless-Specific Filters -- 11.8 Wireless Security -- 11.9 Final Thoughts.

Includes index.

There are no comments on this title.

to post a comment.
  • Monday - Friday
  • 8:00 AM - 5:00 PM
  • Saturday - Sunday
  • Closed
  • Phone: +971 431 83183
  • Email: Library@aud.edu
  • Address: Sheikh Zayed Road -- P.O. Box 28282, Dubai, AE
  • Map & Directions