- Wireshark 2 Quick Start Guide
- Charit Mishra
- 187字
- 2021-06-25 20:45:48
Summary
In this chapter, we looked at the basic networking concepts that you need to know, along with an introduction to Wireshark. Wireshark is a protocol analyzer that is used worldwide by technology professionals to capture and analyze network-level packets.
We also learned about the TCP/IP model. The TCP/IP model has four layers: the application layer, transport layer, network layer, and the link layer. Data is encapsulated as it passes from one layer to another; the resulting packet at the bottom is called a complete PDU.
The TCP is a reliable protocol because acknowledgements are sent as part of its process, whereas the UDP is an unreliable protocol because no acknowledgements are sent.
To install Wireshark, you just need to visit http://www.wireshark.org and then download the appropriate version for your operating system.
Troubleshooting your Wireshark can be done by ensuring that the network is working fine, that you have the full rights required to install and run the application, and that the installation had completed without any exceptions.
In the next chapter we will run our first Wireshark capture and get to feel the protocol analysis experience.
- Enterprise Cloud Security and Governance
- 計(jì)算機(jī)病毒原理與防范(第2版)
- 黑客攻防與網(wǎng)絡(luò)安全從新手到高手(絕招篇)
- 計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)研究
- Digital Forensics with Kali Linux
- Building a Home Security System with BeagleBone
- 局域網(wǎng)交換機(jī)安全
- 數(shù)字政府網(wǎng)絡(luò)安全合規(guī)性建設(shè)指南:密碼應(yīng)用與數(shù)據(jù)安全
- 網(wǎng)絡(luò)空間安全法律問題研究
- 網(wǎng)絡(luò)攻防實(shí)戰(zhàn)研究:MySQL數(shù)據(jù)庫(kù)安全
- 計(jì)算機(jī)系統(tǒng)與網(wǎng)絡(luò)安全研究
- 黑客攻防入門
- Kali Linux無線網(wǎng)絡(luò)滲透測(cè)試詳解
- 信息組織
- Python Penetration Testing Essentials