Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Buy

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment.

Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples.

Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material.

Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wireshark’s features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The book’s final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark.

By the end of the book you will gain the following:

  • Master the basics of Wireshark
  • Explore the virtual w4sp-lab environment that mimics a real-world network
  • Gain experience using the Debian-based Kali OS among other systems
  • Understand the technical details behind network attacks
  • Execute exploitation and grasp offensive and defensive activities, exploring them through Wireshark
  • Employ Lua to extend Wireshark features and create useful scripts

To sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark.

(HTML tags aren't allowed.)

DW 2.0: The Architecture for the Next Generation of Data Warehousing (Morgan Kaufman Series in Data Management Systems)
DW 2.0: The Architecture for the Next Generation of Data Warehousing (Morgan Kaufman Series in Data Management Systems)
First book on the new generation of data warehouse architecture, DW 2.0--by the "father of the data warehouse".

Data Warehousing has been around for 20 years and has become part of the information technology infrastructure. Data warehousing originally grew in response to the corporate need for information--not
...
Agile For Dummies, IBM Limited Edition
Agile For Dummies, IBM Limited Edition
Welcome to Agile For Dummies, IBM Limited Edition. You’ve probably been hearing about agile for a long time, which isn’t surprising. If you’re not using agile methods already though, or if you’ve only been exposed to agile on small projects here and there, you may wonder how to get started with it. Can...
Internet, Phone, Mail, and Mixed-Mode Surveys: The Tailored Design Method
Internet, Phone, Mail, and Mixed-Mode Surveys: The Tailored Design Method

The classic survey design reference, updated for the digitalage

For over two decades, Dillman's classic text on survey designhas aided both students and professionals in effectively planningand conducting mail, telephone, and, more recently, Internetsurveys. The new edition is thoroughly updated and revised, andcovers...


SAS 9.2 Intelligence Platform: Security Administration Guide
SAS 9.2 Intelligence Platform: Security Administration Guide
Explains the security model for the SAS Intelligence Platform and provides instructions for performing security-related administrative tasks. The emphasis is on suite-wide aspects of the security functionality that SAS provides.

New and enhanced features in the following areas increase security and manageability:
Learning Java
Learning Java

Version 5.0 of the Java 2 Standard Edition SDK is the most important upgrade since Java first appeared a decade ago. With Java 5.0, you'll not only find substantial changes in the platform, but to the language itself-something that developers of Java took five years to complete. The main goal of Java 5.0 is to make it easier...

Web Engineering Advancements and Trends: Building New Dimensions of Information Technology (Premier Reference Source)
Web Engineering Advancements and Trends: Building New Dimensions of Information Technology (Premier Reference Source)

As countless failures in information technology and Web-based systems are caused by an incorrect understanding of knowledge sharing, an increased awareness of modern, fundamental industry concepts becomes crucial to Web and interface developers.

Web Engineering Advancements and Trends: Building New Dimensions of Information...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy