Summary
In this chapter, we looked at the power of using capture filters in a busy network and how to find our way through a big trace file using display filters or simply splitting it into multiple files for easy navigation. We also created new profiles in Wireshark to help us ease our day-to-day activities and learned how to use the awesome command-line utilities that are shipped with Wireshark. We will be using these as well as the advanced techniques as we move ahead further in this book. In the next chapter, we will analyze threats to LAN security.