Wireshark for Security Professionals - Using Wireshark and the Metasploit Framework / Nejlevnější knihy
Wireshark for Security Professionals - Using Wireshark and the Metasploit Framework

Kód: 05074072

Wireshark for Security Professionals - Using Wireshark and the Metasploit Framework

Autor Jessey Bullock, Jeff T. Parker

The book will contain the necessary background information to install and use both Wireshark and the Metasploit Framework, including basic networking and security principles. Next, performing basic tasks in Wireshark will be discu ... celý popis

1066


Skladem u dodavatele
Odesíláme za 14-18 dnů
Přidat mezi přání

Mohlo by se vám také líbit

Darujte tuto knihu ještě dnes
  1. Objednejte knihu a zvolte Zaslat jako dárek.
  2. Obratem obdržíte darovací poukaz na knihu, který můžete ihned předat obdarovanému.
  3. Knihu zašleme na adresu obdarovaného, o nic se nestaráte.

Více informací

Více informací o knize Wireshark for Security Professionals - Using Wireshark and the Metasploit Framework

Nákupem získáte 107 bodů

Anotace knihy

The book will contain the necessary background information to install and use both Wireshark and the Metasploit Framework, including basic networking and security principles. Next, performing basic tasks in Wireshark will be discussed. The book will then discuss the Lua scripting integration into Wireshark and how to use it for packet analysis and extending Wireshark. Then the process of actually capturing packets will be discussed in detail, exploring numerous ways to obtain packet captures based on the network and/or other requirements. Then there will be a discussion on using MiTM attacks as a way to capture packets.This part of the book will include practical demonstrations of network MiTM attacks using the Metasploit Framework and then identify those attacks with Wireshark. This will include an explanation of the attacks from a technical perspective using Wireshark's graphical view of packets as a learning reinforcement. Practical security use cases using Wireshark, such as sniffing credentials and recovering data from packet captures, will be presented. The book will end with a chapter on various miscellaneous tasks and a practical case study that expands on the topics learned throughout the book to provide a cohesive example of how to leverage Wireshark in a real world scenario.The book will be designed such that the readers can download virtual machines and PCAPs from the public internet and configure them so that they can follow along with the examples shown within the book. Source code will also be provided for any of the Lua scripts that are developed throughout the book.The important topics of the book are: Basic Usage of Wireshark/MetasploitLua Scripting with WiresharkTechnical Details of Common Network ExploitationPacket Analysis in relation to security research

Parametry knihy

Zařazení knihy Knihy v angličtině Computing & information technology Computer networking & communications Network security

1066

Oblíbené z jiného soudku



Osobní odběr Praha, Brno a 12903 dalších

Copyright ©2008-24 nejlevnejsi-knihy.cz Všechna práva vyhrazenaSoukromíCookies


Můj účet: Přihlásit se
Všechny knihy světa na jednom místě. Navíc za skvělé ceny.

Nákupní košík ( prázdný )

Vyzvednutí v Zásilkovně
zdarma nad 1 499 Kč.

Nacházíte se: