Network Traffic Analysis and Eavesdropping
In the previous chapter, we learned about a network device’s memory structures, and the buffer space allocations, attacks, and countermeasures related to them. In this chapter, we will learn about the various packet analyses, tools/scripts used for packet analysis, and network-level attacks.
This chapter starts with the demonstration of common tools such as Wireshark and TCPdump that are used to perform deep packet analysis. We shall also look into some of the Linux-based scripts that help attackers and network administrators, to understand the various levels of network packets to either plan for the attacks or secure against them.
In this chapter, we will cover the following main topics:
- Packet analysis tools – Wireshark, TCPdump, and others
- Python/Pyshark for deep network analysis
- Advanced packet dissection with LUA
- ARP spoofing, session hijacking, and data hijacking tools, scripts, and techniques...