Instant download Wireshark for Security Professionals Using Wireshark and the Metasploit Framework 1118918215 pdf, docx, kindle format all chapters after payment.
Product details:
- ISBN 10: 1118918223
- ISBN 13: 9781118918227
- Author: Jessey Bullock, Jeff T. Parker
Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples. Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material. Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wireshark’s features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The book’s final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark.
Table contents:
Chapter 1: Introducing Wireshark
Chapter 2: Setting Up the Lab
Chapter 3: The Fundamentals
Chapter 4: Capturing Packets
Chapter 5: Diagnosing Attacks
Chapter 6: Offensive Wireshark
Chapter 7: Decrypting TLS, Capturing USB, Keyloggers, and Network Graphing
Chapter 8: Scripting with Lua
People also search:
how can wireshark be used for security
is wireshark a security risk
do hackers use wireshark
wireshark security tool
wireshark configuration for cyber security analysis
Reviews
There are no reviews yet.