Summary

Use Wireshark to keep your network secure by defending against common forms of infiltration attempts. Analyzing the packets from a security perspective will give you a new insight into how to deal with malicious users.

Activities such as port scanning, footprinting, and various active information gathering attempts are the basis of attacking methodologies that can be taken advantage of to bypass your security infrastructure. Create filters and signatures to identify malicious traffic patterns.

Guessing passwords to gain unauthorized access is called a brute force attack. Through Wireshark, you can filter and identify such malicious forms of traffic.

Wireshark can help you in analyzing malware behavior, and using the behavior analyzed, ...

Get Wireshark 2 Quick Start Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.