Abstract

This chapter overviews Wireshark, its various features, and supporting programs. It covers the history of Wireshark, its compatibility with other sniffers, and its supported protocols and reviews the Wireshark GUI and the filter capabilities. The chapter covers the programs that come with Wireshark, that add additional functionality by manipulating capture files. It explores several scenarios for using Wireshark in network architecture. Knowing the segmentation of a network will help with placing Wireshark to capture the information that is needed. Wireshark's usage by a wide range of people, including network system and security administrators has also been explained. Wireshark can also be used by anyone on their own network. Although the application is robust and stable, cost-effective things can be done to improve the Wireshark experience. Finally, it exemplifies network troubleshooting methodology. The chapter states that it is a good practice to use this methodology every time to troubleshoot a problem.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.