Summary

In this chapter, we solved SMTP forensics challenges using Wireshark and learned how to use Wireshark to detect attacks on e-mail communications, when conducted via popular security tools such as Metasploit and Nmap. In the next chapter, we will look at the malicious trace files and learn how to analyze them with the help of Wireshark.

Get Wireshark Network Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.