Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Wireshark Network Security
Wireshark Network Security

Wireshark Network Security: A succinct guide to securely administer your network using Wireshark

Arrow left icon
Profile Icon Verma
Arrow right icon
NZ$45.99 NZ$51.99
Full star icon Full star icon Full star icon Half star icon Empty star icon 3.5 (6 Ratings)
eBook Jul 2015 138 pages 1st Edition
eBook
NZ$45.99 NZ$51.99
Paperback
NZ$64.99
Subscription
Free Trial
Arrow left icon
Profile Icon Verma
Arrow right icon
NZ$45.99 NZ$51.99
Full star icon Full star icon Full star icon Half star icon Empty star icon 3.5 (6 Ratings)
eBook Jul 2015 138 pages 1st Edition
eBook
NZ$45.99 NZ$51.99
Paperback
NZ$64.99
Subscription
Free Trial
eBook
NZ$45.99 NZ$51.99
Paperback
NZ$64.99
Subscription
Free Trial

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Table of content icon View table of contents Preview book icon Preview Book

Wireshark Network Security

Chapter 2. Tweaking Wireshark

It goes without saying that once you start sniffing on a busy network, you will be flooded with a bulk load of traffic, and in no time you may lose track of what you were looking for and seek assistance. Therefore, it becomes vital to understand the different features that come with the sniffer. This chapter will focus on such features while analyzing multiple trace files using Wireshark. At the end of this chapter, you will be comfortable with:

  • Working with filters in Wireshark
  • Creating multiple profiles
  • Using advanced techniques
  • Performing command-line fu with handy utilities that come prepackaged with Wireshark

Filtering our way through Wireshark

Filters are like conditionals that programmers/developers use while writing code. If we only wanted to see the ARP packets in the TelnetCapture.pcap file, we will apply a condition in the Filter toolbar for ARP and if the current file contains ARP packets, they will be displayed else no packets will be seen at all.

Filtering our way through Wireshark

Only ARP traffic on display

The current stable version, 1.12.6, of Wireshark includes a total 13 default capture filters and 15 default display filters. To look at the list of available capture filters, we can go to the Menu bar, click on Capture | Capture Filters..., and to look at the available display filters, click on the Filter button on the Filter toolbar. We can use these as is, or we can use them as templates and customize them to add/create new ones to suit our needs.

Filtering our way through Wireshark

Default capture filters available in Wireshark

Wireshark provides the following two types of filtering options:

  • Capture filters
  • Display filters

Tip

The syntax for capture and...

Wireshark profiles

As we get comfortable using Wireshark, we will be creating several filters along the way, and some of them will be pretty neat and useful in critical situations. Also, there will be situations when fixing a particular issue requires the use of multiple display and/or capture filters, various colorization schemes to highlight bad/unexpected frames in the traffic assisting in visual distinction of such traffic, and customized preferences setting and layout changes. Therefore, creating our own profile for an attack scenario, a troubleshooting or any specific case is always a good option.

To look at the currently used profile in Wireshark, look at the bottom-right corner of the Status bar. So far, we have worked with the Default profile.

Creating a new profile

To create a new profile, press a combination of Ctrl + Shift + A on the keyboard and click on New, or go to Edit | Configuration Profiles . We can also right-click on the Profile area in the Status bar, and select New...

Essential techniques in Wireshark

The techniques introduced under this section will provide you with the basic knowledge of what you will be dealing with, before diving deep into the packet analysis; these techniques are essential to understand from the packet analysis perspective. These mostly fall under the Statistics menu under the Menu bar as shown in the following figure:

Essential techniques in Wireshark

Numerous options under the Statistics category

The Summary window

To access the Summary window in Wireshark, go to Statistics in the Menu bar and select Summary. The Summary window includes the following:

  • File details
  • Time details
  • Capture details
  • Display details

Important details that can be deduced from here are:

  • Capture time and duration
  • Version details of operating system and Wireshark
  • Capture interface
  • Any capture/display filter used
  • Average packets/sec, average packet size
  • Average bytes/sec

The Protocol Hierarchy window

To view this, go to Statistics in the Menu bar and select Protocol Hierarchy. This section provides us with...

Wireshark command-line fu

In order to work conveniently with the command-line tools that come with Wireshark, it is recommended to add the path of the local Wireshark directory to the system environment variables. As we move ahead, I will assume that you've already configured the system environment variable as mentioned. Having said that, now let's look at the following more useful command-line utilities that ship with Wireshark:

  • tshark
  • capinfos
  • editcap
  • mergecap

Tip

Pass the -h argument with any of the command-line utilities to browse through the help options with each utility. For example, open the command prompt and run tshark –h.

tshark

The command-line version of Wireshark: tshark is used to capture and often display packets in typical situations when we don't have the privilege of using an interactive user interface, or when we are concerned about packet loss. Because in situations where a bulk load of traffic is flowing on the network, Wireshark's capture engine...

Summary

In this chapter, we looked at the power of using capture filters in a busy network and how to find our way through a big trace file using display filters or simply splitting it into multiple files for easy navigation. We also created new profiles in Wireshark to help us ease our day-to-day activities and learned how to use the awesome command-line utilities that are shipped with Wireshark. We will be using these as well as the advanced techniques as we move ahead further in this book. In the next chapter, we will analyze threats to LAN security.

Left arrow icon Right arrow icon

Description

If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

Who is this book for?

If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

What you will learn

  • Familiarize yourself with the robust features offered by Wireshark
  • Use the powerful commandline utilities shipped with Wireshark
  • Analyze numerous threats to network security using Wireshark
  • Investigate attacks performed using popular security tools such as Nmap, Nessus, Metasploit, and more
  • Solve realworld CTF challenges using Wireshark
  • Create your own securityrelated profile in Wireshark
  • Configure Wireshark for effective network troubleshooting
  • Get accustomed to common scenarios faced by security analysts
  • Analyze malware traffic successfully by using Wireshark
  • Unearth anomalies hampering the speed of network communications

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Jul 29, 2015
Length: 138 pages
Edition : 1st
Language : English
ISBN-13 : 9781784399511
Tools :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Product Details

Publication date : Jul 29, 2015
Length: 138 pages
Edition : 1st
Language : English
ISBN-13 : 9781784399511
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just NZ$7 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just NZ$7 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total NZ$ 226.97
Learning Network Forensics
NZ$80.99
Wireshark Network Security
NZ$64.99
Mastering Wireshark
NZ$80.99
Total NZ$ 226.97 Stars icon

Table of Contents

7 Chapters
1. Getting Started with Wireshark – What, Why, and How? Chevron down icon Chevron up icon
2. Tweaking Wireshark Chevron down icon Chevron up icon
3. Analyzing Threats to LAN Security Chevron down icon Chevron up icon
4. Probing E-mail Communications Chevron down icon Chevron up icon
5. Inspecting Malware Traffic Chevron down icon Chevron up icon
6. Network Performance Analysis Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Half star icon Empty star icon 3.5
(6 Ratings)
5 star 33.3%
4 star 33.3%
3 star 0%
2 star 16.7%
1 star 16.7%
Filter icon Filter
Top Reviews

Filter reviews by




Mark Libbrecht Aug 22, 2015
Full star icon Full star icon Full star icon Full star icon Full star icon 5
The book does what it says and contains many practical hands-on’ examples how to detect and understand what’s going on on your LAN. Apart from being a Wireshark user manual, it is also a primer in LAN security threats: no special pre knowledge requiered. Since our router can record all processed data packets in Wireshark format, this book was an obvious choice.
Amazon Verified review Amazon
JC Dec 15, 2016
Full star icon Full star icon Full star icon Full star icon Full star icon 5
VERY INFORMATION. IT PROVIDES DETAILED INFO ABOUT USING WIRESHARK
Amazon Verified review Amazon
Elias Silva Jun 25, 2018
Full star icon Full star icon Full star icon Full star icon Empty star icon 4
This is a very good book, it has a lot of very helpful Display filter to identify and assess bad or malicious traffic. however, there is an exercise in the book where the reader need to download a capture file to perform an exercise but the link doesn't work or the file was removed from the site. The writer should include the file in somewhere to be downloaded by the readers in a safely manner, and avoid issues with third party links.
Amazon Verified review Amazon
Quardy Sep 02, 2015
Full star icon Full star icon Full star icon Full star icon Empty star icon 4
Wireshark Network Security starts off with a generational level overview of the functions and menus of Wireshark including a brief introduction of the command line tshark. It then goes into several different examples and case studies of common attacks and how you can utilize Wireshark to help you identify them. Ultimately, Wireshark Network Security is a good resource for introduction level network forensic and in my opinion good enough to get you started. The book was very easy to read and follow.
Amazon Verified review Amazon
Human Jul 07, 2017
Full star icon Full star icon Empty star icon Empty star icon Empty star icon 2
Really light on actual pcaps to work with. Only two out of the five CTF examples from the book have working links because the author decided not to go through the work of actually making example pcaps that he owned--maybe the links worked two years ago. Overall I'm pretty disappointed with this book. And why on earth do I have to download a pdf for the color pictures of the screenshots?! They're all black and white in the book! My recommendation is just go to the Wireshark FAQ page or google.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.