Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering Wireshark 2

You're reading from   Mastering Wireshark 2 Develop skills for network analysis and address a wide range of information security threats

Arrow left icon
Product type Paperback
Published in May 2018
Publisher
ISBN-13 9781788626521
Length 326 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Andrew Crouthamel Andrew Crouthamel
Author Profile Icon Andrew Crouthamel
Andrew Crouthamel
Arrow right icon
View More author details
Toc

Summary


So in this chapter, you've learned about some email analysis using POP and SMTP. We also looked at 802.11, which is wireless, what certain things look like in a packet capture, and the fact that you'll need to do additional troubleshooting outside of what you can do in Wireshark in order to properly diagnose wireless. We also looked at VoIP analysis using SIP and RTP, creating that connection and then transmitting that audio data directly from one device to another. Then, we also played that back using the built-in tools in Wireshark, and manipulated some of the settings in that for jitter, in order to recreate problems and be able to listen to what that sounds like.

Next is Chapter 10, Command-Line Tools, where we'll use some command-line tools to extend Wireshark, and talk about some of the enhancements that you can add to it.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at R$50/month. Cancel anytime