版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
丛 书 名:Community Experience Distilled
版本说明:1
I S B N:(纸本) 9781785887819;9781785885846
出 版 社:Packt Publishing
出 版 年:2015年
主 题 词:Computer networks--Security measures Debugging in computer science Computer networks
学科分类:12[管理学] 1201[管理学-管理科学与工程(可授管理学、工学学位)] 08[工学] 081201[工学-计算机系统结构] 0812[工学-计算机科学与技术(可授工学、理学学位)]
摘 要:About This BookGain hands-on experience of troubleshooting errors in TCP/IP and SSL protocols through practical use casesIdentify and overcome security flaws in your network to get a deeper insight into security analysisThis is a fast-paced book that focuses on quick and effective packet captures through practical examples and exercisesWho This Book Is ForIf you are a network administrator who wants to effectively capture packets, a security consultant who wants to audit packet flows, or a white hat hacker who wants to view and remediate sensitive information, this book is for you. This book requires decoding skills and a basic understanding of *** You Will LearnUtilize Wireshark s advanced features to analyze packet capturesCapture network packets with tcpdump and snoop with examplesEnhance your TCP/IP troubleshooting skill by solving practical use cases on the TCP/IP state diagram and handshake processDeep dive into SSL/TLS handshakeGet to know more about protocols such as DHCPv6, DHCP, DNS, and HTTP with WiresharkSet up 802.11 WLAN captures and discover more about the WAN protocolLearn security aspects and their mitigation techniques for attack such as DoS / ARP Poisoning and moreIn DetailWireshark provides a very useful way to decode an RFC and examine it. The packet captures displayed in Wireshark give you an insight into the security and flaws of different protocols to help you perform security research and protocol *** book starts by introducing you to various packet analyzers to find out which one best suits your needs. You will learn how to use the command line and the Wireshark GUI to capture packets by employing filters. Moving on, you will learn about TCP/IP communication and gain an understanding of the SSL/TLS flow with Wireshark. Next, you will perform analysis on application-related protocols. We follow this with some best practices to analyze wireless traffic and identify different attack vectors such as DoS, ARP, Heartbleed,