Wireshark for Security Professionals - Using Wireshark and the Metasploit Framework / Libristo.pl
Wireshark for Security Professionals - Using Wireshark and the Metasploit Framework

Code: 05074072

Wireshark for Security Professionals - Using Wireshark and the Metasploit Framework

by Jessey Bullock, Jeff T. Parker

The book will contain the necessary background information to install and use both Wireshark and the Metasploit Framework, including basic networking and security principles. Next, performing basic tasks in Wireshark will be discu ... more

217.18

RRP: 228.67 zł

You save 11.49 zł


In stock at our supplier
Shipping in 14 - 18 days
Add to wishlist

You might also like

Give this book as a present today
  1. Order book and choose Gift Order.
  2. We will send you book gift voucher at once. You can give it out to anyone.
  3. Book will be send to donee, nothing more to care about.

Book gift voucher sampleRead more

More about Wireshark for Security Professionals - Using Wireshark and the Metasploit Framework

You get 127 loyalty points

Book synopsis

The book will contain the necessary background information to install and use both Wireshark and the Metasploit Framework, including basic networking and security principles. Next, performing basic tasks in Wireshark will be discussed. The book will then discuss the Lua scripting integration into Wireshark and how to use it for packet analysis and extending Wireshark. Then the process of actually capturing packets will be discussed in detail, exploring numerous ways to obtain packet captures based on the network and/or other requirements. Then there will be a discussion on using MiTM attacks as a way to capture packets.This part of the book will include practical demonstrations of network MiTM attacks using the Metasploit Framework and then identify those attacks with Wireshark. This will include an explanation of the attacks from a technical perspective using Wireshark's graphical view of packets as a learning reinforcement. Practical security use cases using Wireshark, such as sniffing credentials and recovering data from packet captures, will be presented. The book will end with a chapter on various miscellaneous tasks and a practical case study that expands on the topics learned throughout the book to provide a cohesive example of how to leverage Wireshark in a real world scenario.The book will be designed such that the readers can download virtual machines and PCAPs from the public internet and configure them so that they can follow along with the examples shown within the book. Source code will also be provided for any of the Lua scripts that are developed throughout the book.The important topics of the book are: Basic Usage of Wireshark/MetasploitLua Scripting with WiresharkTechnical Details of Common Network ExploitationPacket Analysis in relation to security research

Book details

Book category Books in English Computing & information technology Computer networking & communications Network security

217.18

Trending among others


Books by language

250 000
safisfied customers

Since 2008, we have served long line of book lovers, but each of them was always on the first place.


Paczkomat 12,99 ZŁ 31975 punktów

Copyright! ©2008-24 libristo.pl All rights reservedPrivacyPoučení o cookies


Account: Log in
Wszystkie książki świata w jednym miejscu. I co więcej w super cenach.

Shopping cart ( Empty )

For free shipping
shop for 299 zł and more

You are here: