ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Wireshark for Network Forensics. An Essential Guide for IT and Cloud Professionals

دانلود کتاب Wireshark for Network Forensics. راهنمای ضروری برای متخصصان فناوری اطلاعات و ابر

Wireshark for Network Forensics. An Essential Guide for IT and Cloud Professionals

مشخصات کتاب

Wireshark for Network Forensics. An Essential Guide for IT and Cloud Professionals

ویرایش:  
نویسندگان: ,   
سری:  
ISBN (شابک) : 9781484290002, 9781484290019 
ناشر:  
سال نشر: 2023 
تعداد صفحات: 283 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 9 Mb 

قیمت کتاب (تومان) : 29,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Wireshark for Network Forensics. An Essential Guide for IT and Cloud Professionals به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب Wireshark for Network Forensics. راهنمای ضروری برای متخصصان فناوری اطلاعات و ابر نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Table of Contents
About the Authors
About the Contributor
About the Technical Reviewer
Acknowledgments
Introduction
Chapter 1: Wireshark Primer
	Introduction
	Get Me Started!
		macOS
		Linux
			Red Hat and Alike
			Ubuntu and Debian Derivatives
				Allowing Non-root User to Capture Packets
		Windows Install
		The First Capture
		Understanding a Packet
			Capture Filters
			Display Filters
			Pcap vs. Pcapng
		Data Representation
	Big Picture: I/O Graphs
	Big Picture: TCP Stream Graphs
		Time Sequence (Stevens)
		Time Sequence (tcptrace)
		Throughput
		Round Trip Time
		Window Scaling
	Bigger Picture: Following a Packet Stream
		Biggest Picture: Flow Graphs
		CloudShark: The Floating Shark
			Get Me Started!
			Feature Parity with Wireshark
			CloudShark API
			CloudShark API Interaction with Curl
			Auto Upload to CloudShark (Raspberry Pi, Linux, MacOSx)
	Summary
Chapter 2: Packet Capture and Analysis
	Sourcing Traffic for Capture
		Setting Up Port Mirroring
		Remote Port Mirroring
		Other Mirroring Options
			TAP
			Hub
		Capture Point Placement
	OS-Native Traffic Capture Tools
		UNIX, Linux, BSD, and macOS
		Windows
	Wireshark-Based Traffic Capture
		CLI-Based Capture with Dumpcap or Tshark
		GUI-Based Capture with Wireshark
			Capturing Traffic from Multiple Interfaces
			Stopping Capture
	Capture Modes and Configurations
		Promiscuous Mode
			Vlan Tag Is Not Seen in Captured Frames
			Monitor Mode
	Remote Packet Capture with Extcap
		Remote Capture with Sshdump
			Requirements
		Mobile Device Traffic Capture
		Android Devices
			Using Native Androiddump Utility
		Using Third-Party Android App and Sshdump
	Capture Filtering
		Capture Filter Deep Dive
			Understanding BPF: What Goes Behind the Capture Filters
		High Volume Packet Analysis
			When the Packet Characteristics Are Known
			When the Packet Encapsulations Is Unknown
		Advanced Filters and Deep Packet Filter
	Summary
	References for This Chapter
Chapter 3: Capturing Secured Application Traffic for Analysis
	Evolution of Application Security
	Capturing and Analyzing HTTPS
		Basics of HTTPS
		Capturing and Filtering HTTPS Traffic
			HTTPS Traffic – Capture Filter
		Analyzing HTTPS Traffic
			Client Hello Message
			Server Hello Message
			Decrypting TLS Traffic Using Wireshark
				Collecting the SSL Key
				Decrypting the HTTPS Traffic
		HTTPS Filters for Analysis
			HTTP2 Statistics Using Wireshark
	Capturing and Analyzing QUIC Traffic
		Basics of QUIC
		Capturing and Filtering QUIC Traffic
			QUIC Traffic – Capture Filter
		Analyzing QUIC Traffic
			QUIC Header
			QUIC Initial Message – TLS Client Hello
			QUIC Initial Message – TLS Server Hello
			QUIC Handshake Message – TLS Server Hello
			QUIC Protected Payload
		Decrypting QUIC/TLS Traffic
		QUIC Filters for Analysis
	Capturing and Analyzing Secure DNS
		Basics of DNS
	Secure DNS
	Summary
	References for This Chapter
Chapter 4: Capturing Wireless Traffic for Analysis
	Basics of Radio Waves and Spectrum
		Basics of Wireless LAN Technology
			Wireless LAN Channels
			Wireless LAN Topologies
				Basic Service Set
				Extended Service Set
				Mesh Basic Service Set
			Wireless LAN Encryption Protocols
	Setting Up 802.11 Radio Tap
		Wireless Capture Using Native Wireshark Tool
		Wireless Capture Using AirPort Utility
		Wireless Capture Using Diagnostic Tool
	Wireless Operational Aspects – Packet Capture and Analysis
		802.11 Frame Types and Format
		Wireless Network Discovery
		Wireless LAN Endpoint Onboarding
			Probing Phase
			Authentication Phase
			Association Phase
			802.1X Exchange Phase
		Wireless LAN Data Exchange
			Decrypting 802.11 Data Frame Payload
				Generating the WPA-PSK Key
		Wireless LAN Statistics Using Wireshark
	Summary
	References for This Chapter
Chapter 5: Multimedia Packet Capture and Analysis
	Multimedia Applications and Protocols
		Multimedia on the Web
		Multimedia Streaming
			Streaming Transport
			Stream Encoding Format
		Real-Time Multimedia
			Signaling
				SIP
				SDP
				SIP over TLS (SIPS)
				H.323
			Media Transport
				RTP
				RTCP
				SRTP and SRTCP
				WebRTC
		How Can Wireshark Help
	Multimedia File Extraction from HTTP Capture
	Streaming RTP Video Captures
	Real-Time Media Captures and Analysis
		Decrypting Signaling (SIP over TLS)
		Decrypting Secure RTP
			Extract the SRTP Encryption Key from SDP
			Filter SRTP-only Packets
			Feed the Key and SRTP Packets to Libsrtp
			Convert Text Format to pcap and Add the Missing UDP Header
				Explanation of Options Used Previously
					For SRTP Decode
					For text2pcap
		Telephony and Video Analysis
			Wireshark Optimization for VoIP
			QoS and Network Issues
			Analyzing VoIP Streams and Graph
				Call Flow and I/O Graph
				RTP Stream Analysis
					RTP Statistics, Packet Loss, Delay, and Jitter Analysis
					Replaying RTP Payload
	Summary
	References for This Chapter
Chapter 6: Cloud and Cloud-Native Traffic Capture
	Evolution of Virtualization and Cloud
		Basics of Virtualization
		Hypervisor – Definition and Types
		Virtualization – Virtual Machines and Containers
			Virtual Machines
			Containers
	Traffic Capture in AWS Environment
		VPC Traffic Mirroring
	Traffic Capture in GCP Environment
	Traffic Capture in Docker Environment
	Traffic Capture in Kubernetes Environment
	Summary
	References for This Chapter
Chapter 7: Bluetooth Packet Capture and Analysis
	Introduction to Bluetooth
		Communication Models
		Radio and Data Transfer
		Bluetooth Protocol Stack
		Controller Operations
			Radio and Baseband Processing
			Link Management Protocol (LMP)
		HCI
		Host Layer Operation
			L2CAP
		Application Profile–Specific Protocols
			SDP
			Telephony Control
			Audio/Video Control and Transport
			RFCOMM
			Other Adopted Protocols
	Tools for Bluetooth Capture
	Linux
	Windows
	macOS
	Bluetooth Packet Filtering and Troubleshooting
		Controller-to-Host Communication
		Pairing and Bonding
		Paired Device Discovery and Data Transfer
	Summary
	References for This Chapter
Chapter 8: Network Analysis and Forensics
	Network Attack Classification
		Packet Poisoning and Spoofing Attacks
			DHCP Spoofing
			DNS Spoofing and Poisoning
			Prevention of Spoofing Attacks
		Network Scan and Discovery Attacks
			ARP and ICMP Ping Sweeps
			UDP Port Scan
			TCP Port Scan
			OS Fingerprinting
			Preventing Port Scan Attacks
		Brute-Force Attacks
			Preventing Brute-Force Attacks
		DoS (Denial-of-Service) Attacks
			Preventing DDoS Attacks
		Malware Attacks
			Prevention of Malware Attacks
	Wireshark Tweaks for Forensics
		Autoresolving Geolocation
		Changing the Column Display
		Frequently Used Wireshark Tricks in Forensics
			Find Exact Packets One at a Time
			Contains Operator
			Following a TCP Stream
	Wireshark Forensic Analysis Approach
		Wireshark DDoS Analysis
		Wireshark Malware Analysis
	Summary
	References for This Chapter
Chapter 9: Understanding and Implementing Wireshark Dissectors
	Protocol Dissectors
		Post and Chain Dissectors
	Creating Your Own Wireshark Dissectors
		Wireshark Generic Dissector (WSGD)
		Lua Dissectors
		C Dissectors
	Creating Your Own Packet
	Summary
	References for This Chapter
Index




نظرات کاربران