Image from Google Jackets
Normal view MARC view

Practical packet analysis : using Wireshark to solve real-world network problems / by Chris Sanders.

By: Publication details: San Francisco : No Starch Press, c2011.Edition: 2nd edDescription: xx, 255 p. : ill. ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781593272661 (pbk.) :
  • 1593272669 (pbk.) :
Subject(s): LOC classification:
  • TK5105.55 .S265 2011
Contents:
Introduction -- Why This Book? -- Concepts and Approach -- How to Use This Book -- About the Sample Capture Files -- The Rural Technology Fund -- Contacting Me -- Chapter 1: Packet Analysis and Network Basics -- 1.1 Packet Analysis and Packet Sniffers -- 1.2 How Computers Communicate -- 1.3 Traffic Classifications -- 1.4 Final Thoughts -- Chapter 2: Tapping into the Wire -- 2.1 Living Promiscuously -- 2.2 Sniffing Around Hubs -- 2.3 Sniffing in a Switched Environment -- 2.4 Sniffing in a Routed Environment -- 2.5 Sniffer Placement in Practice -- Chapter 3: Introduction to Wireshark -- 3.1 A Brief History of Wireshark -- 3.2 The Benefits of Wireshark -- 3.3 Installing Wireshark -- 3.4 Wireshark Fundamentals -- Chapter 4: Working with Captured Packets -- 4.1 Working with Capture Files -- 4.2 Working with Packets -- 4.3 Setting Time Display Formats and References -- 4.4 Setting Capture Options -- 4.5 Using Filters -- Chapter 5: Advanced Wireshark Features -- 5.1 Network Endpoints and Conversations -- 5.2 Protocol Hierarchy Statistics -- 5.3 Name Resolution -- 5.4 Protocol Dissection -- 5.5 Following TCP Streams -- 5.6 Packet Lengths -- 5.7 Graphing -- 5.8 Expert Information -- Chapter 6: Common Lower-Layer Protocols -- 6.1 Address Resolution Protocol -- 6.2 Internet Protocol -- 6.3 Transmission Control Protocol -- 6.4 User Datagram Protocol -- 6.5 Internet Control Message Protocol -- Chapter 7: Common Upper-Layer Protocols -- 7.1 Dynamic Host Configuration Protocol -- 7.2 Domain Name System -- 7.3 Hypertext Transfer Protocol -- 7.4 Final Thoughts -- Chapter 8: Basic Real-World Scenarios -- 8.1 Social Networking at the Packet Level -- 8.2 Capturing ESPN.com Traffic -- 8.3 Real-World Problems -- 8.4 Final Thoughts -- Chapter 9: Fighting a Slow Network -- 9.1 TCP Error-Recovery Features -- 9.2 TCP Flow Control -- 9.3 Learning from TCP Error-Control and Flow-Control Packets -- 9.4 Locating the Source of High Latency -- 9.5 Network Baselining -- 9.6 Final Thoughts -- Chapter 10: Packet Analysis for Security -- 10.1 Reconnaissance -- 10.2 Exploitation -- 10.3 Final Thoughts -- Chapter 11: Wireless Packet Analysis -- 11.1 Physical Considerations -- 11.2 Wireless Card Modes -- 11.3 Sniffing Wirelessly in Windows -- 11.4 Sniffing Wirelessly in Linux -- 11.5 802.11 Packet Structure -- 11.6 Adding Wireless-Specific Columns to the Packet List Pane -- 11.7 Wireless-Specific Filters -- 11.8 Wireless Security -- 11.9 Final Thoughts.
Holdings
Item type Current library Home library Shelving location Call number Status Barcode
Books Books American University in Dubai American University in Dubai Main Collection TK 5105.55 .S265 2011 (Browse shelf(Opens below)) Available 5065056

Introduction -- Why This Book? -- Concepts and Approach -- How to Use This Book -- About the Sample Capture Files -- The Rural Technology Fund -- Contacting Me -- Chapter 1: Packet Analysis and Network Basics -- 1.1 Packet Analysis and Packet Sniffers -- 1.2 How Computers Communicate -- 1.3 Traffic Classifications -- 1.4 Final Thoughts -- Chapter 2: Tapping into the Wire -- 2.1 Living Promiscuously -- 2.2 Sniffing Around Hubs -- 2.3 Sniffing in a Switched Environment -- 2.4 Sniffing in a Routed Environment -- 2.5 Sniffer Placement in Practice -- Chapter 3: Introduction to Wireshark -- 3.1 A Brief History of Wireshark -- 3.2 The Benefits of Wireshark -- 3.3 Installing Wireshark -- 3.4 Wireshark Fundamentals -- Chapter 4: Working with Captured Packets -- 4.1 Working with Capture Files -- 4.2 Working with Packets -- 4.3 Setting Time Display Formats and References -- 4.4 Setting Capture Options -- 4.5 Using Filters -- Chapter 5: Advanced Wireshark Features -- 5.1 Network Endpoints and Conversations -- 5.2 Protocol Hierarchy Statistics -- 5.3 Name Resolution -- 5.4 Protocol Dissection -- 5.5 Following TCP Streams -- 5.6 Packet Lengths -- 5.7 Graphing -- 5.8 Expert Information -- Chapter 6: Common Lower-Layer Protocols -- 6.1 Address Resolution Protocol -- 6.2 Internet Protocol -- 6.3 Transmission Control Protocol -- 6.4 User Datagram Protocol -- 6.5 Internet Control Message Protocol -- Chapter 7: Common Upper-Layer Protocols -- 7.1 Dynamic Host Configuration Protocol -- 7.2 Domain Name System -- 7.3 Hypertext Transfer Protocol -- 7.4 Final Thoughts -- Chapter 8: Basic Real-World Scenarios -- 8.1 Social Networking at the Packet Level -- 8.2 Capturing ESPN.com Traffic -- 8.3 Real-World Problems -- 8.4 Final Thoughts -- Chapter 9: Fighting a Slow Network -- 9.1 TCP Error-Recovery Features -- 9.2 TCP Flow Control -- 9.3 Learning from TCP Error-Control and Flow-Control Packets -- 9.4 Locating the Source of High Latency -- 9.5 Network Baselining -- 9.6 Final Thoughts -- Chapter 10: Packet Analysis for Security -- 10.1 Reconnaissance -- 10.2 Exploitation -- 10.3 Final Thoughts -- Chapter 11: Wireless Packet Analysis -- 11.1 Physical Considerations -- 11.2 Wireless Card Modes -- 11.3 Sniffing Wirelessly in Windows -- 11.4 Sniffing Wirelessly in Linux -- 11.5 802.11 Packet Structure -- 11.6 Adding Wireless-Specific Columns to the Packet List Pane -- 11.7 Wireless-Specific Filters -- 11.8 Wireless Security -- 11.9 Final Thoughts.

Includes index.

There are no comments on this title.

to post a comment.
  • Monday - Friday
  • 8:00 AM - 5:00 PM
  • Saturday - Sunday
  • Closed
  • Phone: +971 431 83183
  • Email: Library@aud.edu
  • Address: Sheikh Zayed Road -- P.O. Box 28282, Dubai, AE
  • Map & Directions