Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Network Analysis using Wireshark 2 Cookbook

You're reading from   Network Analysis using Wireshark 2 Cookbook Practical recipes to analyze and secure your network using Wireshark 2

Arrow left icon
Product type Paperback
Published in Mar 2018
Publisher
ISBN-13 9781786461674
Length 626 pages
Edition 2nd Edition
Arrow right icon
Authors (3):
Arrow left icon
Nagendra Kumar Nainar Nagendra Kumar Nainar
Author Profile Icon Nagendra Kumar Nainar
Nagendra Kumar Nainar
Yoram Orzach Yoram Orzach
Author Profile Icon Yoram Orzach
Yoram Orzach
Yogesh Ramdoss Yogesh Ramdoss
Author Profile Icon Yogesh Ramdoss
Yogesh Ramdoss
Arrow right icon
View More author details
Toc

Table of Contents (20) Chapters Close

Preface 1. Introduction to Wireshark Version 2 FREE CHAPTER 2. Mastering Wireshark for Network Troubleshooting 3. Using Capture Filters 4. Using Display Filters 5. Using Basic Statistics Tools 6. Using Advanced Statistics Tools 7. Using the Expert System 8. Ethernet and LAN Switching 9. Wireless LAN 10. Network Layer Protocols and Operations 11. Transport Layer Protocol Analysis 12. FTP, HTTP/1, and HTTP/2 13. DNS Protocol Analysis 14. Analyzing Mail Protocols 15. NetBIOS and SMB Protocol Analysis 16. Analyzing Enterprise Applications' Behavior 17. Troubleshooting SIP, Multimedia, and IP Telephony 18. Troubleshooting Bandwidth and Delay Issues 19. Security and Network Forensics

What this book covers

Chapter 1, Introduction to Wireshark Version 2, covers basic tasks related to Wireshark.

Chapter 2, Mastering Wireshark for Network Troubleshooting, covers issues that improve the use of Wireshark as a network analysis tool.

Chapter 3, Using Capture Filters, talks about capture filters.

Chapter 4, Using Display Filters, shows how to work with display filters.

Chapter 5, Using Basic Statistics Tools, looks at simple tools that provide us with basic network statistics.

Chapter 6, Using Advanced Statistics Tools, covers advanced statistical tools—I/O graphs, TCP stream graphs, and, in brief, UDP multicast streams.

Chapter 7, Using the Expert System, teaches you how to use the expert system, a tool that provides deeper analysis of network phenomena, including events and problems.

Chapter 8, Ethernet and LAN Switching, focuses on how to find and resolve layer 2-based problems, with a focus on Ethernet-based issues such as broadcast/multicast events, errors, and finding their source.

Chapter 9, Wireless LAN, analyzes wireless LAN traffic and diagnoses connectivity and performance problems reported by users.

Chapter 10, Network Layer Protocols and Operations, primarily focuses on layer 3 of the OSI reference model and shows how to analyze the layer 3 protocol (IPv4/IPv6) operations. We also cover unicast and multicast traffic flow analysis.

Chapter 11, Transport Layer Protocol Analysis, primarily focuses on the transport layer of the OSI reference model, but also teaches you how to analyze various layer 4 protocol (TCP/UDP/SCTP) operations.

Chapter 12, FTP, HTTP/1, and HTTP/2, discusses these protocols, how they work, and how to use Wireshark to find common errors and problems in the network.

Chapter 13, DNS Protocol Analysis, covers the basic principles of the DNS protocol, the functionality, commonly faced issues, and the use of Wireshark to analyze and troubleshoot the protocol.

Chapter 14, Analyzing Mail Protocols, looks at the normal operation of email protocols and how to use Wireshark for basic analysis and troubleshooting.

Chapter 15, NetBIOS and SMB Protocol Analysis, teaches you how to use Wireshark to resolve and troubleshoot common applications that are used in an enterprise network, such as NetBIOS and SMB protocols.

Chapter 16, Analyzing Enterprise Applications' Behavior, explains how to use Wireshark to resolve and troubleshoot common applications that are used in an enterprise network.

Chapter 17, Troubleshooting SIP, Multimedia, and IP Telephony, discusses different protocols and how to analyze audio and video streams using Wireshark.

Chapter 18, Troubleshooting Bandwidth and Delay Issues, teaches you how to measure these network parameters, check for network problems caused by them, and solve these when possible.

Chapter 19, Security and Network Forensics, starts by differentiating between normal and unusual network traffic. Then, the chapter introduces the various types of attacks, where they come from, and how to isolate and solve them.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime