We are happy to present you completlely new issue dedicated to the most known sniffer – Wireshark. We are sure all of you know this special toll. You can use it to analyze network traffic, intrusion detection, or communication protocols development.
This issue is a guidbook for all those who wants to learn step-by-step how to use this sniffing tool. With this issue you will get basic knowledge on how to start an amazing adventure with Wireshark, but you will also dive into deep waters of hacking knowledge. Except of BASICS section you will also find TRAFIC ANALYSIS and INTRUSION DETECTION sections, full of our expert’s tutorials.
We would also thank to our friends from PenTest Magazine for sharing their great articles. We appreciate their work which helped us to create this great issue.
Wireshark Tips and Tricks
By Tony Lee, Scientist at FireEye, Inc.
Jason Bevis, Managing Principal at FireEye Labs
If you were tasked to put together a forensic toolkit with 25 tools or less, chances are Wireshark would be one of those tools–especially if you planned on dealing with packet captures. Because it is free, open source, and cross-platform, Wireshark makes a great packet capture and analysis tool for just about any forensic toolkit. Never the less, this staple tool has been around for so long (think back to the days of Ethereal) that we sometimes take it for granted. In this article we will explore a few tips and tricks that highlight why we like this tool so much.
Getting Started with Wireshark
By Sebastian Perez, Information Security Analyst at OLX, CEH
As a pentester, I always get involved in different projects from different clients and no matter what the objective is, having the knowledge and the proper tool to perform the task will save a lot of time, and avoid some headaches. This article will try to aid for those scenarios where a network analysis should be performed. We will focus in one of the most important tools for a pentester:
Sniffing and Recovering Network Information Using Wireshark
By Fotis Liatsis, System/Network Administrator of Greek Student Security Team – CampSec
Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Wireshark is cross-platform, using the GTK+ widget toolkit to implement its user interface, and using pcap to capture packets, it runs on various Unix-like operating systems including Linux, OS X, BSD, and Solaris, and on Microsoft Windows.
Traffic Analysis and Capture Passwords
By Rafael Fontes, Co-Founder at Grey Hat and member of “French Backtrack Team”
It is known that Wireshark is a powerful tool that goes far beyond a simple sniffer. What many do not know is that there are several ways to harness the potential of this tool, readers, this article will introduce. Let us learn to sniff the network effectively, create filters to find only the information we want, see it as a black hat would use this tool to steal passwords and finally, how to use Wireshark to diagnose network problems or if a firewall is blocking packets correctly.
Detect/Analyze Scanning Traffic Using Wireshark
By Santosh Kumar, Technical Manager at Koenig Solutions Ltd., CEH, CCSE, CCMSE, CISCO ASA SPECIALIST
“Wireshark”, the world’s most popular Network Protocol Analyzer is a multipurpose tool. It can be used as a Packet Sniffer, Network Analyser, Protocol Analyser & Forensic tool. Through this article my focus is on how to use Wireshark to detect/analyze any scanning &
Discover How The Attack Happened By Wireshark
By Basem Helmy, Information Security Engineer, ECSA/LPT
In this scenario a pcap file generated by cyberlympics in the 2013 competition will be used to answer the following questions to identify how the attacker get in and how he extract the data from the compromised machine.
Detecting Attacks and Threats in Elastic Cloud Infrastructures: the Case of Side-channel Attacks
By Pasquale Puzio, CIFRE PhD Student at SecludIT and EURECOM
Sergio Loureiro,Co-Founder and CEO at SecludIT
Cloud computing adoption is rising fast. Flexibility, pay-per-use and available resources on-demand with the promise of lower ownership costs are a very attractive value proposition.
Content-Based Intrusion Detection System
By Mark Sitkowski, Consultant to Forticom Security, Design Simulation Systems Ltd
Nobody ever broke into a bank’s IT system by cracking a user’s password. It’s not cost-effective to waste computer time on such a pursuit, for the sake of the few thousand dollars thatmay, or may not be in the user’s account.Comments
Tagged with: Analyze Scanning Traffic • Capture Passwords • CEH • Detect Scanning Traffic • Detecting Attacks • Detecting Threats • Elastic Cloud Infrastructures • FireEye Labs • Information Security Analyst • intrusion detection system • Network Protocol Analyzer • pentester • Recovering Network Information • Side-channel Attacks • Sniffing • Traffic Analysis • wireshark