About the Authors |
|
xi | |
About the Contributor |
|
xiii | |
About the Technical Reviewer |
|
xv | |
Acknowledgments |
|
xvii | |
Introduction |
|
xix | |
|
Chapter 1 Wireshark Primer |
|
|
1 | (28) |
|
|
1 | (2) |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
7 | (6) |
|
|
13 | (1) |
|
|
14 | (1) |
|
Big Picture: TCP Stream Graphs |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
Bigger Picture: Following a Packet Stream |
|
|
19 | (1) |
|
Biggest Picture: Flow Graphs |
|
|
20 | (1) |
|
CloudShark: The Floating Shark |
|
|
21 | (6) |
|
|
27 | (2) |
|
Chapter 2 Packet Capture and Analysis |
|
|
29 | (36) |
|
Sourcing Traffic for Capture |
|
|
30 | (1) |
|
Setting Up Port Mirroring |
|
|
30 | (1) |
|
|
31 | (3) |
|
|
34 | (1) |
|
|
35 | (1) |
|
OS-Native Traffic Capture Tools |
|
|
36 | (1) |
|
UNIX, Linux, BSD, and macOS |
|
|
36 | (3) |
|
|
39 | (2) |
|
Wireshark-Based Traffic Capture |
|
|
41 | (1) |
|
CLI-Based Capture with Dumpcap orTshark |
|
|
41 | (2) |
|
GUI-Based Capture with Wireshark |
|
|
43 | (2) |
|
Capture Modes and Configurations |
|
|
45 | (1) |
|
|
45 | (2) |
|
Remote Packet Capture with Extcap |
|
|
47 | (1) |
|
Remote Capture with Sshdump |
|
|
47 | (2) |
|
Mobile Device Traffic Capture |
|
|
49 | (1) |
|
|
49 | (3) |
|
Using Third-Party Android App and Sshdump |
|
|
52 | (2) |
|
|
54 | (2) |
|
|
56 | (4) |
|
High Volume Packet Analysis |
|
|
60 | (1) |
|
Advanced Filters and Deep Packet Filter |
|
|
61 | (2) |
|
|
63 | (1) |
|
References for This Chapter |
|
|
64 | (1) |
|
Chapter 3 Capturing Secured Application Traffic for Analysis |
|
|
65 | (42) |
|
Evolution of Application Security |
|
|
66 | (3) |
|
Capturing and Analyzing HTTPS |
|
|
69 | (1) |
|
|
69 | (3) |
|
Capturing and Filtering HTTPS Traffic |
|
|
72 | (1) |
|
|
73 | (9) |
|
HTTPS Filters for Analysis |
|
|
82 | (3) |
|
Capturing and Analyzing QUIC Traffic |
|
|
85 | (1) |
|
|
85 | (4) |
|
Capturing and Filtering QUIC Traffic 4 |
|
|
89 | (1) |
|
|
90 | (8) |
|
Decrypting QUIC/TLS Traffic |
|
|
98 | (1) |
|
QUIC Filters for Analysis |
|
|
98 | (1) |
|
Capturing and Analyzing Secure DNS |
|
|
99 | (1) |
|
|
99 | (3) |
|
|
102 | (3) |
|
|
105 | (1) |
|
References for This Chapter |
|
|
105 | (2) |
|
Chapter 4 Capturing Wireless Traffic for Analysis |
|
|
107 | (36) |
|
Basics of Radio Waves and Spectrum |
|
|
107 | (3) |
|
Basics of Wireless LAN Technology |
|
|
110 | (7) |
|
Setting Up 802.11 Radio Tap |
|
|
117 | (1) |
|
Wireless Capture Using Native Wireshark Tool |
|
|
118 | (1) |
|
Wireless Capture Using AirPort Utility |
|
|
119 | (1) |
|
Wireless Capture Using Diagnostic Tool |
|
|
120 | (1) |
|
Wireless Operational Aspects - Packet Capture and Analysis |
|
|
121 | (1) |
|
802.11 Frame Types and Format |
|
|
122 | (3) |
|
Wireless Network Discovery |
|
|
125 | (2) |
|
Wireless LAN Endpoint Onboarding |
|
|
127 | (9) |
|
Wireless LAN Data Exchange |
|
|
136 | (4) |
|
Wireless LAN Statistics Using Wireshark |
|
|
140 | (1) |
|
|
141 | (1) |
|
References for This Chapter |
|
|
142 | (1) |
|
Chapter 5 Multimedia Packet Capture and Analysis |
|
|
143 | (30) |
|
Multimedia Applications and Protocols |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
144 | (2) |
|
|
146 | (4) |
|
|
150 | (1) |
|
Multimedia File Extraction from HTTP Capture |
|
|
151 | (1) |
|
Streaming RTP Video Captures |
|
|
152 | (1) |
|
Real-Time Media Captures and Analysis |
|
|
153 | (1) |
|
Decrypting Signaling (SIP overTLS) |
|
|
153 | (5) |
|
|
158 | (5) |
|
Telephony and Video Analysis |
|
|
163 | (8) |
|
|
171 | (1) |
|
References for This Chapter |
|
|
172 | (1) |
|
Chapter 6 Cloud and Cloud-Native Traffic Capture |
|
|
173 | (30) |
|
Evolution of Virilization and Cloud |
|
|
173 | (1) |
|
|
174 | (3) |
|
Hypervisor - Definition and Types |
|
|
177 | (1) |
|
Virilization - Virtual Machines and Containers |
|
|
178 | (3) |
|
Traffic Capture in AWS Environment |
|
|
181 | (1) |
|
|
182 | (5) |
|
Traffic Capture in GCP Environment |
|
|
187 | (6) |
|
Traffic Capture in Docker Environment |
|
|
193 | (2) |
|
Traffic Capture in Kubernetes Environment |
|
|
195 | (6) |
|
|
201 | (1) |
|
References for This Chapter |
|
|
201 | (2) |
|
Chapter 7 Bluetooth Packet Capture and Analysis |
|
|
203 | (18) |
|
Introduction to Bluetooth |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
205 | (2) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
209 | (1) |
|
Application Profile-Specific Protocols ~ |
|
|
210 | (2) |
|
Tools for Bluetooth Capture |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
214 | (1) |
|
Bluetooth Packet Filtering and Troubleshooting |
|
|
215 | (1) |
|
Controller-to-Host Communication |
|
|
215 | (1) |
|
|
216 | (2) |
|
Paired Device Discovery and Data Transfer |
|
|
218 | (2) |
|
|
220 | (1) |
|
References for This Chapter |
|
|
220 | (1) |
|
Chapter 8 Network Analysis and Forensics |
|
|
221 | (24) |
|
Network Attack Classification |
|
|
221 | (1) |
|
Packet Poisoning and Spoofing Attacks |
|
|
222 | (3) |
|
Network Scan and Discovery Attacks |
|
|
225 | (4) |
|
|
229 | (1) |
|
DoS (Denial-of-Service) Attacks |
|
|
230 | (2) |
|
|
232 | (2) |
|
Wireshark Tweaks for Forensics |
|
|
234 | (1) |
|
Autoresolving Geolocation |
|
|
234 | (1) |
|
Changing the Column Display |
|
|
235 | (1) |
|
Frequently Used Wireshark Tricks in Forensics |
|
|
235 | (1) |
|
Wireshark Forensic Analysis Approach |
|
|
236 | (1) |
|
|
236 | (5) |
|
Wireshark Malware Analysis |
|
|
241 | (3) |
|
|
244 | (1) |
|
References for This Chapter |
|
|
244 | (1) |
|
Chapter 9 Understanding and Implementing Wireshark Dissectors |
|
|
245 | (17) |
|
|
250 | (3) |
|
Post and Chain Dissectors |
|
|
253 | (1) |
|
Creating Your Own Wireshark Dissectors |
|
|
253 | (1) |
|
Wireshark Generic Dissector (WSGD) |
|
|
253 | (1) |
|
|
254 | (3) |
|
|
257 | (1) |
|
|
258 | (3) |
|
|
261 | (1) |
References for This Chapter |
|
262 | (1) |
Index |
|
263 | |