Summary

In this chapter, we learned how to use Wireshark to look for and put together the different pieces of the malware traffic analysis puzzle and also elaborated on IRC botnet-infected communication. In the next chapter, we will look at how to use Wireshark to meet our network performance needs.

Get Wireshark Network Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.