Summary

In this chapter, we looked at the most common attacks that can occur in a LAN environment and saw how we can use Wireshark's optimum features to detect such attacks. Also, we need to emphasize on baselining for good traffic, in order to better deal with the threats to LAN security, so that any anomaly thereof can be easily detected via Wireshark. Another handy trick is to possess a good list of filters and coloring rules to match them and save the analysis time. We took a brief look at the tools that complement Wireshark very well and used some to solve the CTF challenge at the end.

Get Wireshark Network Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.