- Wireshark 2 Quick Start Guide
- Charit Mishra
- 107字
- 2021-06-25 20:45:49
Capturing methodologies
In order to capture the right set of a packets stream, you would need to know where to place your protocol analyser. Depending on the requirements (source of packets, number of packets, type of packets, and more), a protocol analyzer needs to be placed at a certain point in the network. Also, a few configuration changes in a network device may be necessary, such as switch configuration changes (mirroring is done in network switches to capture packets from one or more sources). The following sub sections discuss a few means of assessing the best way of configuring protocol analyses in certain types of topology.
推薦閱讀
- API安全實戰
- 網絡安全應急管理與技術實踐
- Enterprise Cloud Security and Governance
- Web安全與攻防入門很輕松(實戰超值版)
- 工業物聯網安全
- 黑客攻防與無線安全從新手到高手(超值版)
- 防火墻技術與應用(第2版)
- Kali Linux Network Scanning Cookbook(Second Edition)
- 模糊測試:強制發掘安全漏洞的利器
- 計算機網絡安全基礎(第5版)
- 解密數據恢復
- 網絡安全應急響應實戰
- 數據保護:工作負載的可恢復性
- 構建新型網絡形態下的網絡空間安全體系
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager