No quedan existencias de este artículo.
¿Quieres vender uno?

Wireshark para profesionales de la seguridad de Jessey Bullock: usado-

Texto original
Wireshark for Security Professionals by Jessey Bullock: Used
Estado:
En buen estado
Precio:
USD18,90
Aproximadamente17,63 EUR
Envío:
Gratis Standard Shipping. Ver detallespara el envío
Ubicado en: Sparks, Nevada, Estados Unidos
Entrega:
Entrega prevista entre el mar. 25 jun. y el sáb. 29 jun. a 43230
Calculamos el plazo de entrega con un método patentado que combina diversos factores, como la proximidad del comprador a la ubicación del artículo, el servicio de envío seleccionado, el historial de envíos del vendedor y otros datos. Los plazos de entrega pueden variar, especialmente en épocas de mucha actividad.
Devoluciones:
30 días para devoluciones. El comprador paga el envío de la devolución. Ver detalles- Más información sobre devoluciones
Pagos:
     

Compra con confianza

Garantía al cliente de eBay
Si no recibes el artículo que has pedido, te devolvemos el dinero. 

Información del vendedor

Registrado como vendedor profesional
El vendedor asume toda la responsabilidad de este anuncio.
N.º de artículo de eBay:364035923331
Última actualización el 19 jun 2024 06:18:58 H.EspVer todas las actualizacionesVer todas las actualizaciones

Características del artículo

Estado
En buen estado: Libro que se ha leído pero que está en buen estado. Daños mínimos en la tapa, ...
Publication Date
2017-03-10
Pages
288
ISBN
9781118918210
Book Title
Wireshark for Security Professionals : Using Wireshark and the Metasploit Framework
Publisher
Wiley & Sons, Incorporated, John
Item Length
9.2 in
Publication Year
2017
Type
Textbook
Format
Trade Paperback
Language
English
Item Height
0.8 in
Author
Jessey Bullock, Jeff T. Parker
Genre
Computers
Topic
Security / Cryptography, Security / General, Security / Networking, Networking / Network Protocols
Item Weight
16.8 Oz
Item Width
7.3 in
Number of Pages
288 Pages

Acerca de este producto

Product Information

An essential guide to network security and the feature-packed Wireshark toolset Open source protocol analyzer Wireshark is the de facto analysis tool across many fields, including the security field. Wireshark provides a powerful feature set that allows you to inspect your network at a microscopic level. The diverse features and support for numerous protocols make Wireshark an invaluable security tool, but also difficult or intimidating for newcomers to learn. Wireshark for Security Professionals is the answer, helping you to leverage Wireshark and related tools such as the command line TShark application quickly and effectively. Coverage includes a complete primer on Metasploit, the powerful offensive tool, as well as Lua, the popular scripting language. This highly practical guide gives you the insight you need to successfully apply what you've learned in the real world. Examples show you how Wireshark is used in an actual network with the provided Docker virtual environment, and basic networking and security principles are explained in detail to help you understand the why along with the how . Using the Kali Linux penetration testing distribution in combination with the virtual lab and provided network captures, you can follow along with the numerous examples or even start practicing right away in a safe network environment. The hands-on experience is made even more valuable by the emphasis on cohesive application, helping you exploit and expand Wireshark's full functionality by extending Wireshark or integrating it with other security tools. With coverage of both offensive and defensive security tools and techniques, Wireshark for Security Professionals shows you how to secure any network as you learn to: Understand the basics of Wireshark and the related toolset as well as the Metasploit Framework Explore the Lua scripting language and how it can be used to extend Wireshark Perform common offensive and defensive security research tasks with Wireshark Gain hands-on experience in a Docker virtual lab environment that replicates real-world enterprise networks Capture packets using advanced MitM techniques Customize the provided source code to expand your toolset

Product Identifiers

Publisher
Wiley & Sons, Incorporated, John
ISBN-10
1118918215
ISBN-13
9781118918210
eBay Product ID (ePID)
203444886

Product Key Features

Book Title
Wireshark for Security Professionals : Using Wireshark and the Metasploit Framework
Number of Pages
288 Pages
Language
English
Publication Year
2017
Topic
Security / Cryptography, Security / General, Security / Networking, Networking / Network Protocols
Genre
Computers
Type
Textbook
Author
Jessey Bullock, Jeff T. Parker
Format
Trade Paperback

Dimensions

Item Height
0.8 in
Item Weight
16.8 Oz
Item Length
9.2 in
Item Width
7.3 in

Additional Product Features

Intended Audience
Trade
Dewey Edition
23
Dewey Decimal
004.62
Lc Classification Number
Tk5105.55
Table of Content
Introduction xiii Chapter 1 Introducing Wireshark 1 What Is Wireshark? 2 A Best Time to Use Wireshark? 2 Avoiding Being Overwhelmed 3 The Wireshark User Interface 3 Packet List Pane 5 Packet Details Pane 6 Packet Bytes Pane 8 Filters 9 Capture Filters 9 Display Filters 13 Summary 17 Exercises 18 Chapter 2 Setting Up the Lab 19 Kali Linux 20 Virtualization 22 Basic Terminology and Concepts 23 Benefits of Virtualization 23 Virtual Box 24 Installing VirtualBox 24 Installing the VirtualBox Extension Pack 31 Creating a Kali Linux Virtual Machine 33 Installing Kali Linux 40 The W4SP Lab 46 Requirements 46 A Few Words about Docker 47 What Is GitHub? 48 Creating the Lab User 49 Installing the W4SP Lab on the Kali Virtual Machine 50 Setting Up the W4SP Lab 53 The Lab Network 54 Summary 55 Exercises 56 Chapter 3 The Fundamentals 57 Networking 58 OSI Layers 58 Networking between Virtual Machines 61 Security 63 The Security Triad 63 Intrusion Detection and Prevention Systems 63 False Positives and False Negatives 64 Malware 64 Spoofing and Poisoning 66 Packet and Protocol Analysis 66 A Protocol Analysis Story 67 Ports and Protocols 71 Summary 73 Exercises 74 Chapter 4 Capturing Packets 75 Sniffing 76 Promiscuous Mode 76 Starting the First Capture 78 TShark 82 Dealing with the Network 86 Local Machine 87 Sniffing Localhost 88 Sniffing on Virtual Machine Interfaces 92 Sniffing with Hubs 96 SPAN Ports 98 Network Taps 101 Transparent Linux Bridges 103 Wireless Networks 105 Loading and Saving Capture Files 108 File Formats 108 Ring Buffers and Multiple Files 111 Recent Capture Files 116 Dissectors 118 W4SP Lab: Managing Nonstandard HTTP Traffic 118 Filtering SMB Filenames 120 Packet Colorization 123 Viewing Someone Else''s Captures 126 Summary 127 Exercises 128 Chapter 5 Diagnosing Attacks 129 Attack Type: Man-in-the-Middle 130 Why MitM Attacks Are Effective 130 How MitM Attacks Get Done: ARP 131 W4SP Lab: Performing an ARP MitM Attack 133 W4SP Lab: Performing a DNS MitM Attack 141 How to Prevent MitM Attacks 147 Attack Type: Denial of Service 148 Why DoS Attacks Are Effective 149 How DoS Attacks Get Done 150 How to Prevent DoS Attacks 155 Attack Type: Advanced Persistent Threat 156 Why APT Attacks Are Effective 156 How APT Attacks Get Done 157 Example APT Traffic in Wireshark 157 How to Prevent APT Attacks 161 Summary 162 Exercises 162 Chapter 6 Offensive Wireshark 163 Attack Methodology 163 Reconnaissance Using Wireshark 165 Evading IPS/IDS 168 Session Splicing and Fragmentation 168 Playing to the Host, Not the IDS 169 Covering Tracks and Placing Backdoors 169 Exploitation 170 Setting Up the W4SP Lab with Metasploitable 171 Launching Metasploit Console 171 VSFTP Exploit 172 Debugging with Wireshark 173 Shell in Wireshark 175 TCP Stream Showing a Bind Shell 176 TCP Stream Showing a Reverse Shell 183 Starting ELK 188 Remote Capture over SSH 190 Summary 191 Exercises 192 Chapter 7 Decrypting TLS, Capturing USB, Keyloggers, and Network Graphing 193 Decrypting SSL/TLS 193 Decrypting SSL/TLS Using Private Keys 195 Decrypting SSL/TLS Using Session Keys 199 USB and Wireshark 202 Capturing USB Traffic on Linux 203 Capturing USB Traffic on Windows 206 TShark Keylogger 208 Graphing the Network 212 Lua with Graphviz Library 213 Summary 218 Exercises 219 Chapter 8 Scripting with Lua 221 Why Lua? 222 Scripting Basics 223 Variables 225 Functions and Blocks 226 Loops 228 Conditionals 230 Setup 230 Checking for Lua Support 231 Lua Initialization 232 Windows Setup 233 Linux Setup 233 Tools 234 Hello World with TShark 236 Counting Packets Script 237 ARP Cache Script 241 Creating Dissectors for Wireshark 244 Dissector Types 245 Why a Dissector Is Needed 245 Experiment 253 Extending Wireshark 255 Packet Direction Script 255 Marking Suspicious Script 257 Snooping SMB File Transfers 260 Summary 262 Index 265
Copyright Date
2017

Descripción del artículo del vendedor

Información de vendedor profesional

Alibris, Inc.
Rob Lambert
2560 9th St
Ste 215
94710-2565 Berkeley, CA
United States
Mostrar información de contacto
:ocinórtcele oerroCmoc.sirbila@90_skoob_flah
Certifico que todas mis actividades de venta cumplirán todas las leyes y reglamentos de la UE.
AlibrisBooks

AlibrisBooks

98,5% de votos positivos
1,8 millones artículos vendidos
Visitar tiendaContactar

Valoraciones detalladas sobre el vendedor

Promedio durante los últimos 12 meses

Descripción precisa
4.9
Gastos de envío razonables
4.9
Rapidez de envío
4.9
Comunicación
4.9
Registrado como vendedor profesional

Votos de vendedor (463.058)

i***0 (232)- Votos emitidos por el comprador.
Mes pasado
Compra verificada
Great book . would buy from seller again.
b***b (377)- Votos emitidos por el comprador.
Mes pasado
Compra verificada
Great experience with this seller. Fast and secure shipping. Much appreciated!
s***f (88)- Votos emitidos por el comprador.
Mes pasado
Compra verificada
This was very quickly shipped and reasonably priced and I thank you

Valoraciones y opiniones del producto

Todavía no hay valoraciones ni opiniones
Sé el primero en escribir una opinión.