Criar um Site Grátis Fantástico
Book Wireshark for Security Professionals : Using Wireshark and the Metasploit Framework by Jessey Bullock in DJV, MOBI

9781118918210
English

1118918215
Leverage Wireshark, Lua and Metasploit to solve any security challengeWireshark is arguably one of the most versatile networking tools available, allowing microscopic examination of almost any kind of network activity. This book is designed to help you quickly navigate and leverage Wireshark effectively, with a primer for exploring the Wireshark Lua API as well as an introduction to the Metasploit Framework."Wireshark for Security Professionals" covers both offensive and defensive concepts that can be applied to any Infosec position, providing detailed, advanced content demonstrating the full potential of the Wireshark tool. Coverage includes the Wireshark Lua API, Networking and Metasploit fundamentals, plus important foundational security concepts explained in a practical manner. You are guided through full usage of Wireshark, from installation to everyday use, including how to surreptitiously capture packets using advanced MiTM techniques. Practical demonstrations integrate Metasploit and Wireshark demonstrating how these tools can be used together, with detailed explanations and cases that illustrate the concepts at work. These concepts can be equally useful if you are performing offensive reverse engineering or performing incident response and network forensics. Lua source code is provided, and you can download virtual lab environments as well as PCAPs allowing them to follow along and gain hands on experience. The final chapter includes a practical case study that expands upon the topics presented to provide a cohesive example of how to leverage Wireshark in a real world scenario.Understand the basics of Wireshark and Metasploit within the security spaceIntegrate Lua scripting to extend Wireshark and perform packet analysisLearn the technical details behind common network exploitationPacket analysis in the context of both offensive and defensive security researchWireshark is the standard network analysis tool used across many industries due to its powerful feature set and support for numerous protocols. When used effectively, it becomes an invaluable tool for any security professional, however the learning curve can be steep. Climb the curve more quickly with the expert insight and comprehensive coverage in "Wireshark for Security Professionals.", The book will contain the necessary background information to install and use both Wireshark and the Metasploit Framework, including basic networking and security principles. Next, performing basic tasks in Wireshark will be discussed. The book will then discuss the Lua scripting integration into Wireshark and how to use it for packet analysis and extending Wireshark. Then the process of actually capturing packets will be discussed in detail, exploring numerous ways to obtain packet captures based on the network and/or other requirements. Then there will be a discussion on using MiTM attacks as a way to capture packets.This part of the book will include practical demonstrations of network MiTM attacks using the Metasploit Framework and then identify those attacks with Wireshark. This will include an explanation of the attacks from a technical perspective using Wireshark's graphical view of packets as a learning reinforcement. Practical security use cases using Wireshark, such as sniffing credentials and recovering data from packet captures, will be presented. The book will end with a chapter on various miscellaneous tasks and a practical case study that expands on the topics learned throughout the book to provide a cohesive example of how to leverage Wireshark in a real world scenario.The book will be designed such that the readers can download virtual machines and PCAPs from the public internet and configure them so that they can follow along with the examples shown within the book. Source code will also be provided for any of the Lua scripts that are developed throughout the book.The important topics of the book are: Basic Usage of Wireshark/MetasploitLua Scripting with WiresharkTechnical Details of Common Network ExploitationPacket Analysis in relation to security research

Wireshark for Security Professionals : Using Wireshark and the Metasploit Framework ebook PDF, DJV