𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals

✍ Scribed by Nagendra Kumar Nainar, Ashish Panda


Publisher
Apress
Year
2022
Tongue
English
Leaves
290
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


====================================================================================================

====================================================================================================

====================================================================================================



Content of RAR file:



unrar l bec28757909dcf8be5b34820ed250bca.rar



UNRAR 6.11 beta 1 freeware Copyright (c) 1993-2022 Alexander Roshal



Archive: bec28757909dcf8be5b34820ed250bca.rar

Details: RAR 5, recovery record



Attributes Size Date Time Name

----------- --------- ---------- ----- ----

-rw-r--r-- 25982558 2023-01-03 12:26 wireshark-network-forensics-essential.pdf

-rw-r--r-- 100533719 2023-01-02 16:14 wireshark-network-forensics-essential.epub

----------- --------- ---------- ----- ----

126516277 2



md5sum wireshark-network-forensics-essential.*

5962a0e6be5f025053a7a15755bbaee3 wireshark-network-forensics-essential.epub

3c26b4f3493e2ef8a3f6a73e8a34a60a wireshark-network-forensics-essential.pdf



These files were already uploaded separately.



The usage of RAR files is to upload supplementary material related to a book, like source code, an image of a CD, pictures, the content of a solution manual, etc.



This RAR file just duplicates data. At least, if you're going to duplicate data just say so and establish a link between those duplicated data and this file.


Hint

It would be nice to display the md5sum of each file contained in the uploaded archive file in the "Files Properties" section.

====================================================================================================

====================================================================================================

====================================================================================================

With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view.Β Β Β 

You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same.Β 

The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network ForensicsΒ provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments.Β 

What You'll Learn

  • Review Wireshark analysis and network forensics
  • Study traffic capture and its analytics from mobile devices
  • Analyze various access technology and cloud traffic
  • Write your own dissector for any new or proprietary packet formats
  • Capture secured application traffic for analysis

Who This Book Is For

IT Professionals, Cloud Architects, Infrastructure Administrators, and Network/Cloud Operators

✦ Table of Contents


Content of RAR file:

unrar l bec28757909dcf8be5b34820ed250bca.rar

UNRAR 6.11 beta 1 freeware Copyright (c) 1993-2022 Alexander Roshal

Archive: bec28757909dcf8be5b34820ed250bca.rar
Details: RAR 5, recovery record

Attributes Size Date Time Name


-rw-r--r-- 25982558 2023-01-03 12:26 wireshark-network-forensics-essential.pdf
-rw-r--r-- 100533719 2023-01-02 16:14 wireshark-network-forensics-essential.epub


        126516277                    2

md5sum wireshark-network-forensics-essential.*
5962a0e6be5f025053a7a15755bbaee3 wireshark-network-forensics-essential.epub
3c26b4f3493e2ef8a3f6a73e8a34a60a wireshark-network-forensics-essential.pdf

These files were already uploaded separately.

The usage of RAR files is to upload supplementary material related to a book, like source code, an image of a CD, pictures, the content of a solution manual, etc.

This RAR file just duplicates data. At least, if you're going to duplicate data just say so and establish a link between those duplicated data and this file.


πŸ“œ SIMILAR VOLUMES


Wireshark for Network Forensics: An Esse
✍ Nagendra Kumar Nainar, Ashish Panda πŸ“‚ Library πŸ“… 2022 πŸ› Apress 🌐 English

<p><span>With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT op

Wireshark for Network Forensics: An Esse
✍ Nagendra Kumar Nainar, Ashish Panda πŸ“‚ Library πŸ“… 2022 πŸ› Apress 🌐 English

<p><span>With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT op

Wireshark revealed: essential skills for
✍ Baxter, James H;Orzach, Yoram;Mishra, Charit πŸ“‚ Library πŸ“… 2017 πŸ› Packt Publishing 🌐 English

Master Wireshark and discover how to analyze network packets and protocols effectively, along with engaging recipes to troubleshoot network problems About This Book - Gain valuable insights into the network and application protocols, and the key fields in each protocol - Use Wireshark's powerful sta

Database Design and Development: An Esse
✍ Paulraj Ponniah(auth.) πŸ“‚ Library πŸ“… 2003 πŸ› Wiley-IEEE Press 🌐 English

The first and only database primer for today's global economy <p> Today's businesses depend on their databases to provide information essential for their day-to-day operations and to help them take advantage of today's rapidly growing and maturing electronic commerce opportunities. The primary respo

Database Design and Development: An Esse
✍ Paulraj Ponniah πŸ“‚ Library πŸ“… 2003 πŸ› Wiley-IEEE Press 🌐 English

The first and only database primer for today's global economy<p>Today's businesses depend on their databases to provide information essential for their day-to-day operations and to help them take advantage of today's rapidly growing and maturing electronic commerce opportunities. The primary respons