![]() ![]() On multiple occasions, I caught myself saying, “Really? I didn’t know you could do that!” Any book that talks about how a protocol works, ties it to real life troubleshooting and security scenarios and then seals the deal with using a tool is a winner in my book (pun intended). ![]() I was stuck, however, how much I didn’t know about Wireshark. I’ve been using Wireshark since the Ethereal days and am no stranger to packet analysis – as we network janitors know, it’s sometimes the best way to discover and solve problems. If it isn’t apparent already, I really enjoyed this book. This is the part where the practical applications and problems are described, detailed and discussed…from troubleshooting to security to wireless. The fourth and final section (chapter 8-11) is where Sanders really earns his keep. Discussing wire tapping is exciting, showing wire captures explains plenty, but understanding the protocols themselves is the can’t-live-without piece that ties everything together. Practical Packet Analysis will show you how to: -Monitor your network in real time and tap live network communications -Build customized capture and display filters -Use packet analysis to troubleshoot and resolve common network problems, like loss of connectivity, DNS issues, and slow speeds -Explore modern exploits and malware at the packet le. This book title, Practical Packet Analysis, 3E (Using Wireshark to Solve Real-World Network Problems), ISBN: 9781593278021, by Chris Sanders, published by No. The third section (chapter 6 – 7) is my favorite. Sanders does an excellent job keeping the text lively, when it’s really just about 1’s and 0’s inside headers. You’ll learn: 5 techniques for capturing packets in any scenario and how to know which one is appropriate The life of a packet and how data moves through the network. This content is as valuable as it is humorous. Practical Packet Analysis will help you build those skills through a series of expert-led lectures, scenario-based demonstrations, and hands-on lab exercises. The second section (chapter 3 – 5) discuss Wireshark in detail. After all, if you don’t have visibility into a network, it becomes more difficult to troubleshoot and provide security. ![]() These two chapters provide a basis for engineers to capture packets to do analysis, which is often overlooked in the real-world. The first section (chapters 1 and 2) describe network sniffing, how it can be done and why it should be done. The book is divided into four general sections. ![]()
0 Comments
Leave a Reply. |