Capturing and Analyzing Network Traffic
In Chapter 1, Networking Primer, we covered several networking activities. One that needs to be explored in more depth is the ability to capture and analyze network traffic. Having the skills to capture and analyze packets is crucial during an ethical hack. You may discover sensitive information, such as login credentials, especially when the service being used is insecure. So, let’s dive into sharpening these skills in this chapter.
In this chapter, we are going to cover the following main topics:
- Capturing network traffic
- Working with network traffic in the cloud
- Putting what you have learned into practice
- Best practices