Summary
At this point, we've covered how to use packet capturing tools, both from a legitimate troubleshooting point of view and from an attacker's point of view. In particular, we've covered how to position and configure things so that packets can be captured, what tools to use, and how to filter the "firehose" of information down to just what you need to solve the issue. Filtering in particular is very useful, which is why there is a two-stage filtering approach in place in Wireshark (at the time of capture and as the packets are being displayed).
We've covered the operation of a VoIP call in some depth, from booting a phone to making a call, to capturing and listening to the audio playback of a call. At this point, you should have some appreciation for the depth of functionality that is available in these tools for network, system, and application administrators. You should be well-positioned to take this appreciation to true mastery – just...