Covers Wireshark and related tools such as the command line TShark application, the offensive tool Metasploit, and the Lua scripting language. Authors J. D. Bullock and Jeff T. Parker show you how Wireshark is used in an actual network with the provided Docker virtual environment, and basic networking and security principles are explained in detail to help you understand the why along with the how.
<ASIN:1118918215>
Using the Kali Linux penetration testing distribution in combination with the virtual lab and provided network captures, you can follow along with the numerous examples. You're also shown how to exploit and expand Wireshark's full functionality by extending Wireshark or integrating it with other security tools.
Authors: J. D. Bullock and Jeff T. Parker Publisher: Wiley Date: March 2017 Pages: 288 ISBN: 978-1118918210 Print: 1118918215 Kindle: B06XDG42W9 Audience: Security professionals Level: intermediate Category:Security
- Understand the basics of Wireshark and the related toolset as well as the Metasploit Framework
- Explore the Lua scripting language and how it can be used to extend Wireshark
- Perform common offensive and defensive security research tasks with Wireshark
- Gain hands-on experience in a Docker virtual lab environment that replicates real-world enterprise networks
- Capture packets using advanced MitM techniques
- Customize the provided source code to expand your toolset
Follow @bookwatchiprog on Twitter or subscribe to I Programmer's Books RSS feed for each day's new addition to Book Watch and for new reviews.
To have new titles included in Book Watch contact BookWatch@i-programmer.info
Beginning Rust Programming
Author: Ric Messier Publisher: Wiley Date: March 2021 Pages: 416 ISBN: 978-1119712978 Print: 1119712971 Kindle: B08WZ2D7WC Audience: Developers wanting to learn Rust Rating: 3 Reviewer: Mike James Everyone seems to want to know what makes Rust special. Does this book give the answers?
|
Kill It With Fire
Author: Marianne Bellotti Publisher: No Starch Press Pages: 248 ISBN: 978-1718501188 Print: 1718501188 Kindle: B08CTFY4JP Audience: Developers renovating aging systems Rating: 4.5 Reviewer: Kay Ewbank
The subtitle of this book is "Manage aging computer systems and future proof modern ones". Thi [ ... ]
| More Reviews |
|