Top 10 Uses of Wireshark for Hackers Part I

Viewing 4 reply threads
  • Author
    • #171748
      Laura Chappell

      EH-Net - Chappell - Top 10 Uses of Wireshark for Hackers Part IWireshark fits nicely in any toolbox of the network forensic analyst and ethical hacker. From hundreds of dissectors that decode the protocol and application fields, to the customization capability that enables you to find that one item of interest in a sea of packets, Wireshark gives you all the necessary insights into traffic. “Wireshark for Hackers” will be a two-part series where we will attempt to turn your crawl into a walk… and maybe even a little swagger.

      In Part I, we will start with some less-sexy baseline and passive discovery hacks with Wireshark. They’re necessary skills, but they won’t be included in a top-ranked film anytime soon. We will then detect unsecured and suspicious traffic on the network and later reassemble some of the suspect traffic elements. Then stay tuned for Part II next month, where we’ll force Wireshark to properly dissect traffic that is using a non-standard port number and add some columns to speed up the detection of a malicious HTTP redirection. We will finish up by decrypting TLS traffic and creating a trace file that contains an embedded TLS session key.

      [See the full article at: Top 10 Uses of Wireshark for Hackers Part I]

    • #174625

      I am joining

    • #174626

      Help me pleez sir

    • #181270
      Rob Williams
      Participant finance-essay writing service

    • #182875
      Jonathan Barnet

      Thanks for sharing these useful tips and hacks, that’s what I was looking for!

Viewing 4 reply threads
  • You must be logged in to reply to this topic.

Copyright ©2021 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.


Sign in with Caendra

Forgot password?Sign up

Forgot your details?