Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals
Autor Nagendra Kumar Nainar, Ashish Pandaen Limba Engleză Paperback – 31 dec 2022
You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn waysto identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same.
The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments.
What You'll Learn
- Review Wireshark analysis and network forensics
- Study traffic capture and its analytics from mobile devices
- Analyze various access technology and cloud traffic
- Write your own dissector for any new or proprietary packet formats
- Capture secured application traffic for analysis
IT Professionals, Cloud Architects, Infrastructure Administrators, and Network/Cloud Operators
Preț: 277.46 lei
Preț vechi: 346.83 lei
-20% Nou
Puncte Express: 416
Preț estimativ în valută:
53.10€ • 55.16$ • 44.11£
53.10€ • 55.16$ • 44.11£
Carte disponibilă
Livrare economică 13-27 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781484290002
ISBN-10: 1484290003
Pagini: 271
Ilustrații: XIX, 271 p. 225 illus., 2 illus. in color.
Dimensiuni: 178 x 254 mm
Greutate: 0.51 kg
Ediția:1st ed.
Editura: Apress
Colecția Apress
Locul publicării:Berkeley, CA, United States
ISBN-10: 1484290003
Pagini: 271
Ilustrații: XIX, 271 p. 225 illus., 2 illus. in color.
Dimensiuni: 178 x 254 mm
Greutate: 0.51 kg
Ediția:1st ed.
Editura: Apress
Colecția Apress
Locul publicării:Berkeley, CA, United States
Cuprins
Ch1:Wireshark Primer.- Ch 2: Packet Capture and Analysis.- Ch 3: Capturing Secured Application for Analysis.- Ch 4: Wireless Packet Capture and Analysis.- Ch 5: Multimedia Capture and Analysis.- Ch 6:Cloud and Cloud-Native Traffic Capture.- Ch 7: Bluetooth Protocol Capture and Analysis.- Ch 8: Wireshark Analysis and Network Forensic. - Ch 9: Writing your own Dissector.
Notă biografică
Nagendra Kumar Nainar (CCIE#20987) is a Principal Engineer with Cisco Customer Experience(CX) Organization (Formerly TAC), focusing on Enterprise customers. He is the co-inventor of more than 130 patent applications in different technologies including Virtualization/Container technologies. He is the co-author of multiple Internet RFCs, various Internet drafts and IEEE papers. Nagendra also co-authored multiple technical books with leading publishers such as Cisco Press and Packt Publication. He is a guest lecturer in North Carolina State University and a speaker in different network forums.
Ashish Panda (CCIE#33270) is a Senior Technical Leader with Cisco Systems Customer Experience CX Organization primarily focused on handling complex service provider network design and troubleshooting escalations. He has 19+ years of rich experience in network design, operation, and troubleshooting with various large enterprises and service provider networks (ISP, satellite,MPLS, 5G, and cloud) worldwide. He is a speaker at various Cisco internal and external events and is very active in the network industry standard bodies.
Textul de pe ultima copertă
With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view.
You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn waysto identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same.
The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments.
You will:
You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn waysto identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same.
The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments.
You will:
- Review Wireshark analysis and network forensics
- Study traffic capture and its analytics from mobile devices
- Analyze various access technology and cloud traffic
- Write your own dissector for any new or proprietary packet formats
- Capture secured application traffic for analysis
Caracteristici
Learn the “What” and “How” of the modern network technologies and the associated Wireshark capabilities Understand how to capture secured control and data plane traffic for network forensic. Explains setting up Wireshark 802.11 captures for various OS types