TY - BOOK AU - Baxter,James H. TI - Wireshark Essentials SN - 1322236348 AV - T55.4-60.8 U1 - 004.66 PY - 2014/// PB - Packt Publishing KW - Packet switching (Data transmission) KW - Computer network protocols KW - Commutation de paquets KW - Protocoles de réseaux d'ordinateurs KW - COMPUTERS KW - Computer Literacy KW - bisacsh KW - Computer Science KW - Data Processing KW - Hardware KW - General KW - Information Technology KW - Machine Theory KW - Reference KW - fast KW - Electronic books N1 - Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Acquainted with Wireshark; Installing Wireshark; Installing Wireshark on Windows; Installing Wireshark on Mac OS X; Installing Wireshark on Linux/Unix; Performing your first packet capture; Selecting a network interface; Performing the packet capture; Wireshark user interface essentials; Filtering out the noise; Applying a display filter; Saving the packet trace; Summary; Chapter 2: Networking for Packet Analysts; The OSI model -- why it matters; Network protocols; The seven OSI layersLayer 1 -- the physical layer; Layer 2 -- the data-link layer; Layer 3 -- the network layer; Layer 4 -- the transport layer; Layer 5 -- the session layer; Layer 6 -- the presentation layer; Layer 7 -- the application layer; IP networks and subnets; Switching and routing packets; Ethernet frames and switches; IP addresses and routers; WAN links; Wireless networking; Summary; Chapter 3: Capturing All the Right Packets; Picking the best capture point; User location; Server location; Other capture locations; Mid-network captures; Both sides of specialized network devices; TAPs and switch port mirroringTest Access Port; Switch port mirroring; Capturing packets on high traffic rate links; Capturing interfaces, filters, and options; Selecting the correct network interface; Using capture filters; Configuring capture filters; Capture options; Capturing filenames and locations; Multiple file options; Ring buffer; Stop capture options; The display options; Name resolution options; Verifying a good capture; Saving the bulk capture file; Isolating conversations of interest; Using the Conversations window; The Ethernet tab; The TCP and UDP tabs; The WLAN tab; Wireshark display filtersThe Display Filter window; The display filter syntax; Typing in a display filter; Display filters from a Conversations or Endpoints window; The filter expression buttons; Using the Expressions window button; Right-click menus on specific packet fields; Following TCP/UDP/SSL streams; Marking and ignoring packets; Saving filtered traffic; Summary; Chapter 4: Configuring Wireshark; Working with packet timestamps; How Wireshark saves timestamps; Wireshark time display options; Adding a time column; Conversation versus displayed packet time options; Choosing the best Wireshark time display optionUsing the Time Reference option; Colorization and coloring rules; Packet colorization; Wireshark preferences; Wireshark profiles; Creating a Wireshark profile; Selecting a Wireshark profile; Summary; Chapter 5: Network Protocols; The OSI and DARPA reference models; Network layer protocols; Wireshark IPv4 filters; Wireshark ARP filters; Internet Group Management Protocol; Wireshark IGMP filters; Internet Control Message Protocol; ICMP pings; ICMP traceroutes; ICMP control message types; ICMP redirects; Internet Protocol Version 6; IPv6 addressing N2 - This book introduces the Wireshark network analyzer to IT professionals across multiple disciplines. It starts off with the installation of Wireshark, before gradually taking you through your first packet capture, identifying and filtering out just the packets of interest, and saving them to a new file for later analysis. The subsequent chapters will build on this foundation by covering essential topics on the application of the right Wireshark features for analysis, network protocols essentials, troubleshooting, and analyzing performance issues. Finally, the book focuses on packet analysis for security tasks, command-line utilities, and tools that manage trace files. Upon finishing this book, you will have successfully added strong Wireshark skills to your technical toolset and significantly increased your value as an IT professional UR - https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=880856 ER -