,Table of Contents
Cover
Title Page
Introduction
Overview of the Book and Technology
How This Book Is Organized
Who Should Read This Book
Tools You Will Need
What’s on the Website
Summary
Chapter 1: Introducing Wireshark
What Is Wireshark?
The Wireshark User Interface
Filters
Summary
Exercises
Chapter 2: Setting Up the Lab
Kali Linux
Virtualization
VirtualBox
The W4SP Lab
Summary
Exercises
Chapter 3: The Fundamentals
Networking
Security
Packet and Protocol Analysis
Summary
Exercises
Chapter 4: Capturing Packets
Sniffing
Dealing with the Network
Loading and Saving Capture Files
Dissectors
Viewing Someone Else’s Captures
, Summary
Exercises
Chapter 5: Diagnosing Attacks
Attack Type: Man-in-the-Middle
Attack Type: Denial of Service
Attack Type: Advanced Persistent Threat
Summary
Exercises
Chapter 6: Offensive Wireshark
Attack Methodology
Reconnaissance Using Wireshark
Evading IPS/IDS
Exploitation
Remote Capture over SSH
Summary
Exercises
Chapter 7: Decrypting TLS, Capturing USB, Keyloggers, and Network
Graphing
Decrypting SSL/TLS
USB and Wireshark
Graphing the Network
Summary
Exercises
Chapter 8: Scripting with Lua
Why Lua?
Scripting Basics
Setup
Tools
Creating Dissectors for Wireshark
Extending Wireshark
Summary
End User License Agreement
, List of Illustrations
Chapter 1: Introducing Wireshark
Figure 1-1: The Wireshark home screen
Figure 1-2: The Packet List pane
Figure 1-3: The Packet Details pane
Figure 1-4: Field information in the status bar
Figure 1-5: ARP packet Opcode
Figure 1-6: Filter results of ARP from a source address
Figure 1-7: Complex display filter example
Chapter 2: Setting Up the Lab
Figure 2-1: Getting SHA-256 file hash in PowerShell
Figure 2-2: VirtualBox SHA-256 checksums
Figure 2-3: VirtualBox installation window
Figure 2-4: VirtualBox feature selection
Figure 2-5: VirtualBox shortcut creation
Figure 2-6: VirtualBox networking warning
Figure 2-7: VirtualBox installation window
Figure 2-8: VirtualBox installation status
Figure 2-9: VirtualBox driver installation prompt
Figure 2-10: VirtualBox installation finished
Figure 2-11: VirtualBox GUI and restart window
Figure 2-12: VirtualBox Extension Pack download
Figure 2-13: VirtualBox Extension Pack preferences
Figure 2-14: VirtualBox Extension Pack installation
Figure 2-15: Successful VirtualBox Extension Pack installation
Figure 2-16: Kali download web page
Figure 2-17: Creating a new virtual machine
Figure 2-18: Selecting virtual machine memory
Figure 2-19: Creating virtual disk
Figure 2-20: Selecting virtual disk type
Figure 2-21: Storage on physical disk
Figure 2-22: Virtual disk size
Figure 2-23: Enabling PAE
Figure 2-24: Selecting start-up disk
Figure 2-25: Kali boot menu
Cover
Title Page
Introduction
Overview of the Book and Technology
How This Book Is Organized
Who Should Read This Book
Tools You Will Need
What’s on the Website
Summary
Chapter 1: Introducing Wireshark
What Is Wireshark?
The Wireshark User Interface
Filters
Summary
Exercises
Chapter 2: Setting Up the Lab
Kali Linux
Virtualization
VirtualBox
The W4SP Lab
Summary
Exercises
Chapter 3: The Fundamentals
Networking
Security
Packet and Protocol Analysis
Summary
Exercises
Chapter 4: Capturing Packets
Sniffing
Dealing with the Network
Loading and Saving Capture Files
Dissectors
Viewing Someone Else’s Captures
, Summary
Exercises
Chapter 5: Diagnosing Attacks
Attack Type: Man-in-the-Middle
Attack Type: Denial of Service
Attack Type: Advanced Persistent Threat
Summary
Exercises
Chapter 6: Offensive Wireshark
Attack Methodology
Reconnaissance Using Wireshark
Evading IPS/IDS
Exploitation
Remote Capture over SSH
Summary
Exercises
Chapter 7: Decrypting TLS, Capturing USB, Keyloggers, and Network
Graphing
Decrypting SSL/TLS
USB and Wireshark
Graphing the Network
Summary
Exercises
Chapter 8: Scripting with Lua
Why Lua?
Scripting Basics
Setup
Tools
Creating Dissectors for Wireshark
Extending Wireshark
Summary
End User License Agreement
, List of Illustrations
Chapter 1: Introducing Wireshark
Figure 1-1: The Wireshark home screen
Figure 1-2: The Packet List pane
Figure 1-3: The Packet Details pane
Figure 1-4: Field information in the status bar
Figure 1-5: ARP packet Opcode
Figure 1-6: Filter results of ARP from a source address
Figure 1-7: Complex display filter example
Chapter 2: Setting Up the Lab
Figure 2-1: Getting SHA-256 file hash in PowerShell
Figure 2-2: VirtualBox SHA-256 checksums
Figure 2-3: VirtualBox installation window
Figure 2-4: VirtualBox feature selection
Figure 2-5: VirtualBox shortcut creation
Figure 2-6: VirtualBox networking warning
Figure 2-7: VirtualBox installation window
Figure 2-8: VirtualBox installation status
Figure 2-9: VirtualBox driver installation prompt
Figure 2-10: VirtualBox installation finished
Figure 2-11: VirtualBox GUI and restart window
Figure 2-12: VirtualBox Extension Pack download
Figure 2-13: VirtualBox Extension Pack preferences
Figure 2-14: VirtualBox Extension Pack installation
Figure 2-15: Successful VirtualBox Extension Pack installation
Figure 2-16: Kali download web page
Figure 2-17: Creating a new virtual machine
Figure 2-18: Selecting virtual machine memory
Figure 2-19: Creating virtual disk
Figure 2-20: Selecting virtual disk type
Figure 2-21: Storage on physical disk
Figure 2-22: Virtual disk size
Figure 2-23: Enabling PAE
Figure 2-24: Selecting start-up disk
Figure 2-25: Kali boot menu