Read Anywhere and on Any Device!

Special Offer | $0.00

Join Today And Start a 30-Day Free Trial and Get Exclusive Member Benefits to Access Millions Books for Free!

Read Anywhere and on Any Device!

  • Download on iOS
  • Download on Android
  • Download on iOS

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Jessey Bullock
4.9/5 (32281 ratings)
Description:The book will contain the necessary background information to install and use both Wireshark and the Metasploit Framework, including basic networking and security principles. Next, performing basic tasks in Wireshark will be discussed. The book will then discuss the Lua scripting integration into Wireshark and how to use it for packet analysis and extending Wireshark. Then the process of actually capturing packets will be discussed in detail, exploring numerous ways to obtain packet captures based on the network and/or other requirements. Then there will be a discussion on using MiTM attacks as a way to capture packets.This part of the book will include practical demonstrations of network MiTM attacks using the Metasploit Framework and then identify those attacks with Wireshark. This will include an explanation of the attacks from a technical perspective using Wireshark's graphical view of packets as a learning reinforcement. Practical security use cases using Wireshark, such as sniffing credentials and recovering data from packet captures, will be presented. The book will end with a chapter on various miscellaneous tasks and a practical case study that expands on the topics learned throughout the book to provide a cohesive example of how to leverage Wireshark in a real world scenario.The book will be designed such that the readers can download virtual machines and PCAPs from the public internet and configure them so that they can follow along with the examples shown within the book. Source code will also be provided for any of the Lua scripts that are developed throughout the book.The important topics of the book are: Basic Usage of Wireshark/MetasploitLua Scripting with WiresharkTechnical Details of Common Network ExploitationPacket Analysis in relation to security researchWe have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework. To get started finding Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework, you are right to find our website which has a comprehensive collection of manuals listed.
Our library is the biggest of these that have literally hundreds of thousands of different products represented.
Pages
Format
PDF, EPUB & Kindle Edition
Publisher
Release
ISBN
1118918223

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Jessey Bullock
4.4/5 (1290744 ratings)
Description: The book will contain the necessary background information to install and use both Wireshark and the Metasploit Framework, including basic networking and security principles. Next, performing basic tasks in Wireshark will be discussed. The book will then discuss the Lua scripting integration into Wireshark and how to use it for packet analysis and extending Wireshark. Then the process of actually capturing packets will be discussed in detail, exploring numerous ways to obtain packet captures based on the network and/or other requirements. Then there will be a discussion on using MiTM attacks as a way to capture packets.This part of the book will include practical demonstrations of network MiTM attacks using the Metasploit Framework and then identify those attacks with Wireshark. This will include an explanation of the attacks from a technical perspective using Wireshark's graphical view of packets as a learning reinforcement. Practical security use cases using Wireshark, such as sniffing credentials and recovering data from packet captures, will be presented. The book will end with a chapter on various miscellaneous tasks and a practical case study that expands on the topics learned throughout the book to provide a cohesive example of how to leverage Wireshark in a real world scenario.The book will be designed such that the readers can download virtual machines and PCAPs from the public internet and configure them so that they can follow along with the examples shown within the book. Source code will also be provided for any of the Lua scripts that are developed throughout the book.The important topics of the book are: Basic Usage of Wireshark/MetasploitLua Scripting with WiresharkTechnical Details of Common Network ExploitationPacket Analysis in relation to security researchWe have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework. To get started finding Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework, you are right to find our website which has a comprehensive collection of manuals listed.
Our library is the biggest of these that have literally hundreds of thousands of different products represented.
Pages
Format
PDF, EPUB & Kindle Edition
Publisher
Release
ISBN
1118918223
loader