16 125 881 książek w 175 językach
Jednak się nie przyda? Nic nie szkodzi! U nas możesz zwrócić towar do 30 dni
Bon prezentowy to zawsze dobry pomysł. Obdarowany może za bon prezentowy wybrać cokolwiek z naszej oferty.
30 dni na zwrot towaru
The book will contain the necessary background information to install and use both Wireshark and the Metasploit Framework, including basic networking and security principles. Next, performing basic tasks in Wireshark will be discussed. The book will then discuss the Lua scripting integration into Wireshark and how to use it for packet analysis and extending Wireshark. Then the process of actually capturing packets will be discussed in detail, exploring numerous ways to obtain packet captures based on the network and/or other requirements. Then there will be a discussion on using MiTM attacks as a way to capture packets.This part of the book will include practical demonstrations of network MiTM attacks using the Metasploit Framework and then identify those attacks with Wireshark. This will include an explanation of the attacks from a technical perspective using Wireshark's graphical view of packets as a learning reinforcement. Practical security use cases using Wireshark, such as sniffing credentials and recovering data from packet captures, will be presented. The book will end with a chapter on various miscellaneous tasks and a practical case study that expands on the topics learned throughout the book to provide a cohesive example of how to leverage Wireshark in a real world scenario.The book will be designed such that the readers can download virtual machines and PCAPs from the public internet and configure them so that they can follow along with the examples shown within the book. Source code will also be provided for any of the Lua scripts that are developed throughout the book.The important topics of the book are: Basic Usage of Wireshark/MetasploitLua Scripting with WiresharkTechnical Details of Common Network ExploitationPacket Analysis in relation to security research