Packet analysis fundamentals with Wireshark

What you'll learn and how you can apply it What a network packet is and how it encapsulates the OSI model The dangers of sending sensitive data unencrypted, "in-the-clear," over an open or untrusted network The difference between encoding and encryption And you'll be able to: Rec...

Full description

Bibliographic Details
Main Author: Chow, Ming (Author)
Format: eBook
Language:English
Published: [Place of publication not identified] O'Reilly Media, Inc. 2023
Edition:[First edition]
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 03644nmm a2200361 u 4500
001 EB002189897
003 EBX01000000000000001327362
005 00000000000000.0
007 cr|||||||||||||||||||||
008 240103 ||| eng
050 4 |a TK5105.55 
100 1 |a Chow, Ming  |e author 
245 0 0 |a Packet analysis fundamentals with Wireshark 
250 |a [First edition] 
260 |a [Place of publication not identified]  |b O'Reilly Media, Inc.  |c 2023 
300 |a 1 video file (2 hr., 11 min.)  |b sound, color 
653 |a Vidéo en continu 
653 |a Protocoles de réseaux d'ordinateurs 
653 |a Commutation de paquets 
653 |a Computer network protocols / http://id.loc.gov/authorities/subjects/sh85029512 
653 |a Packet switching (Data transmission) / fast 
653 |a streaming video / aat 
653 |a Computer network protocols / fast 
653 |a Streaming video / http://id.loc.gov/authorities/subjects/sh2005005237 
653 |a Packet switching (Data transmission) / http://id.loc.gov/authorities/subjects/sh85096523 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
856 4 0 |u https://learning.oreilly.com/videos/~/0636920959205/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 004.6/6 
520 |a What you'll learn and how you can apply it What a network packet is and how it encapsulates the OSI model The dangers of sending sensitive data unencrypted, "in-the-clear," over an open or untrusted network The difference between encoding and encryption And you'll be able to: Reconstruct files (e.g., images, video, audio, apps) from network traffic. Catch sensitive information (including usernames and passwords) from network traffic. Verify sensitive information without illegally logging into a system without permission. Filter network traffic by IP address(es), protocol, and even by strings. Analyze network traffic containing malware. This course is for you because... You're a software engineer or web developer who wants to know more on how things work on the network level.  
520 |a Packet analysis using Wireshark is one of the most critical hands-on skills to have as a security practitioner. It is also a versatile skill, spanning many facets of cybersecurity. If you read a technical report on network security, threat intelligence, or even application security, Wireshark is commonly used and referenced. Packet analysis and Wireshark are used in system administration, troubleshooting networks, incident response, and forensics. In this course, learners will learn the basics of packet analysis, looking at and understanding network traffic, and using real network traffic in exercises. Basics including network packet, the Open Systems Interconnection model (OSI) model, and a packet capture (PCAP) file will be introduced. Demonstrations include using Wireshark to reconstruct a conversation between two computers, extract pictures from a PCAP file, extract credentials that were sent insecurely on a network, and analyze maltraffic.  
520 |a You're a security practitioner and want to understand how things (i.e., the network, network communications under the hood) really work -beyond just using security tools (e.g., Ettercap, Kismet, Xplico, NetworkMiner). You want to become a network engineer or specialist. You have aspirations to work in network security or threat intelligence. Prerequisites: Basic working knowledge of computers, including installing software, uploading and downloading content, hardware, and software Rudimentary knowledge of computer security concepts such as plaintext, encryption/decryption, malware