Wireshark for Network Forensics. An Essential Guide for IT and Cloud Professionals

دانلود کتاب Wireshark for Network Forensics. An Essential Guide for IT and Cloud Professionals

48000 تومان موجود

کتاب Wireshark for Network Forensics. راهنمای ضروری برای متخصصان فناوری اطلاعات و ابر نسخه زبان اصلی

دانلود کتاب Wireshark for Network Forensics. راهنمای ضروری برای متخصصان فناوری اطلاعات و ابر بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 4


توضیحاتی در مورد کتاب Wireshark for Network Forensics. An Essential Guide for IT and Cloud Professionals

نام کتاب : Wireshark for Network Forensics. An Essential Guide for IT and Cloud Professionals
عنوان ترجمه شده به فارسی : Wireshark for Network Forensics. راهنمای ضروری برای متخصصان فناوری اطلاعات و ابر
سری :
نویسندگان : ,
ناشر :
سال نشر : 2023
تعداد صفحات : 283
ISBN (شابک) : 9781484290002 , 9781484290019
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 9 Mb



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Table of Contents About the Authors About the Contributor About the Technical Reviewer Acknowledgments Introduction Chapter 1: Wireshark Primer Introduction Get Me Started! macOS Linux Red Hat and Alike Ubuntu and Debian Derivatives Allowing Non-root User to Capture Packets Windows Install The First Capture Understanding a Packet Capture Filters Display Filters Pcap vs. Pcapng Data Representation Big Picture: I/O Graphs Big Picture: TCP Stream Graphs Time Sequence (Stevens) Time Sequence (tcptrace) Throughput Round Trip Time Window Scaling Bigger Picture: Following a Packet Stream Biggest Picture: Flow Graphs CloudShark: The Floating Shark Get Me Started! Feature Parity with Wireshark CloudShark API CloudShark API Interaction with Curl Auto Upload to CloudShark (Raspberry Pi, Linux, MacOSx) Summary Chapter 2: Packet Capture and Analysis Sourcing Traffic for Capture Setting Up Port Mirroring Remote Port Mirroring Other Mirroring Options TAP Hub Capture Point Placement OS-Native Traffic Capture Tools UNIX, Linux, BSD, and macOS Windows Wireshark-Based Traffic Capture CLI-Based Capture with Dumpcap or Tshark GUI-Based Capture with Wireshark Capturing Traffic from Multiple Interfaces Stopping Capture Capture Modes and Configurations Promiscuous Mode Vlan Tag Is Not Seen in Captured Frames Monitor Mode Remote Packet Capture with Extcap Remote Capture with Sshdump Requirements Mobile Device Traffic Capture Android Devices Using Native Androiddump Utility Using Third-Party Android App and Sshdump Capture Filtering Capture Filter Deep Dive Understanding BPF: What Goes Behind the Capture Filters High Volume Packet Analysis When the Packet Characteristics Are Known When the Packet Encapsulations Is Unknown Advanced Filters and Deep Packet Filter Summary References for This Chapter Chapter 3: Capturing Secured Application Traffic for Analysis Evolution of Application Security Capturing and Analyzing HTTPS Basics of HTTPS Capturing and Filtering HTTPS Traffic HTTPS Traffic – Capture Filter Analyzing HTTPS Traffic Client Hello Message Server Hello Message Decrypting TLS Traffic Using Wireshark Collecting the SSL Key Decrypting the HTTPS Traffic HTTPS Filters for Analysis HTTP2 Statistics Using Wireshark Capturing and Analyzing QUIC Traffic Basics of QUIC Capturing and Filtering QUIC Traffic QUIC Traffic – Capture Filter Analyzing QUIC Traffic QUIC Header QUIC Initial Message – TLS Client Hello QUIC Initial Message – TLS Server Hello QUIC Handshake Message – TLS Server Hello QUIC Protected Payload Decrypting QUIC/TLS Traffic QUIC Filters for Analysis Capturing and Analyzing Secure DNS Basics of DNS Secure DNS Summary References for This Chapter Chapter 4: Capturing Wireless Traffic for Analysis Basics of Radio Waves and Spectrum Basics of Wireless LAN Technology Wireless LAN Channels Wireless LAN Topologies Basic Service Set Extended Service Set Mesh Basic Service Set Wireless LAN Encryption Protocols Setting Up 802.11 Radio Tap Wireless Capture Using Native Wireshark Tool Wireless Capture Using AirPort Utility Wireless Capture Using Diagnostic Tool Wireless Operational Aspects – Packet Capture and Analysis 802.11 Frame Types and Format Wireless Network Discovery Wireless LAN Endpoint Onboarding Probing Phase Authentication Phase Association Phase 802.1X Exchange Phase Wireless LAN Data Exchange Decrypting 802.11 Data Frame Payload Generating the WPA-PSK Key Wireless LAN Statistics Using Wireshark Summary References for This Chapter Chapter 5: Multimedia Packet Capture and Analysis Multimedia Applications and Protocols Multimedia on the Web Multimedia Streaming Streaming Transport Stream Encoding Format Real-Time Multimedia Signaling SIP SDP SIP over TLS (SIPS) H.323 Media Transport RTP RTCP SRTP and SRTCP WebRTC How Can Wireshark Help Multimedia File Extraction from HTTP Capture Streaming RTP Video Captures Real-Time Media Captures and Analysis Decrypting Signaling (SIP over TLS) Decrypting Secure RTP Extract the SRTP Encryption Key from SDP Filter SRTP-only Packets Feed the Key and SRTP Packets to Libsrtp Convert Text Format to pcap and Add the Missing UDP Header Explanation of Options Used Previously For SRTP Decode For text2pcap Telephony and Video Analysis Wireshark Optimization for VoIP QoS and Network Issues Analyzing VoIP Streams and Graph Call Flow and I/O Graph RTP Stream Analysis RTP Statistics, Packet Loss, Delay, and Jitter Analysis Replaying RTP Payload Summary References for This Chapter Chapter 6: Cloud and Cloud-Native Traffic Capture Evolution of Virtualization and Cloud Basics of Virtualization Hypervisor – Definition and Types Virtualization – Virtual Machines and Containers Virtual Machines Containers Traffic Capture in AWS Environment VPC Traffic Mirroring Traffic Capture in GCP Environment Traffic Capture in Docker Environment Traffic Capture in Kubernetes Environment Summary References for This Chapter Chapter 7: Bluetooth Packet Capture and Analysis Introduction to Bluetooth Communication Models Radio and Data Transfer Bluetooth Protocol Stack Controller Operations Radio and Baseband Processing Link Management Protocol (LMP) HCI Host Layer Operation L2CAP Application Profile–Specific Protocols SDP Telephony Control Audio/Video Control and Transport RFCOMM Other Adopted Protocols Tools for Bluetooth Capture Linux Windows macOS Bluetooth Packet Filtering and Troubleshooting Controller-to-Host Communication Pairing and Bonding Paired Device Discovery and Data Transfer Summary References for This Chapter Chapter 8: Network Analysis and Forensics Network Attack Classification Packet Poisoning and Spoofing Attacks DHCP Spoofing DNS Spoofing and Poisoning Prevention of Spoofing Attacks Network Scan and Discovery Attacks ARP and ICMP Ping Sweeps UDP Port Scan TCP Port Scan OS Fingerprinting Preventing Port Scan Attacks Brute-Force Attacks Preventing Brute-Force Attacks DoS (Denial-of-Service) Attacks Preventing DDoS Attacks Malware Attacks Prevention of Malware Attacks Wireshark Tweaks for Forensics Autoresolving Geolocation Changing the Column Display Frequently Used Wireshark Tricks in Forensics Find Exact Packets One at a Time Contains Operator Following a TCP Stream Wireshark Forensic Analysis Approach Wireshark DDoS Analysis Wireshark Malware Analysis Summary References for This Chapter Chapter 9: Understanding and Implementing Wireshark Dissectors Protocol Dissectors Post and Chain Dissectors Creating Your Own Wireshark Dissectors Wireshark Generic Dissector (WSGD) Lua Dissectors C Dissectors Creating Your Own Packet Summary References for This Chapter Index




پست ها تصادفی