exclusive developer for Chappell University.
Limit of Liability/Disclaimer of Warranty. The author and publisher have used their best efforts in
preparing this book and the related materials used in this book. Protocol Analysis Institute, Inc, Chappell
University and the author(s) make no representations or warranties or merchantability or fitness for a
particular purpose. Protocol Analysis Institute, Inc and Chappell University assume no liability for any damages
caused by following instructions or using the techniques or tools listed in this book or related materials used in
this book. Protocol Analysis Institute, Inc, Chappell University and the author(s) make no representations or
warranties that extend beyond the descriptions contained in this paragraph. No warranty may be created or
extended by sales representatives or written sales materials. The accuracy or completeness of the information
provided herein and the opinions stated herein are not guaranteed or warranted to produce any particular
result and the advice and strategies contained herein may not be suitable for every individual. Protocol
Analysis Institute, Inc, Chappell University and author(s) shall not be liable for any loss of profit or any other
commercial damages, including without limitation special, incidental, consequential, or other damages.
Always ensure you have proper authorization before you listen to and capture network traffic.
Copy Protection. In all cases, reselling or duplication of this book and related materials used in this training
course without explicit written authorization is expressly forbidden. We will find you, ya know. So don’t steal it
or plagiarize this book.
This book and the book website,
www.wiresharkbook.com
, references Chanalyzer Pro software created by
MetaGeek (
www.metageek.net/wiresharkbook
).
This book and the book website,
www.wiresharkbook.com
, references GeoLite data created by MaxMind,
available from
www.maxmind.com
.
PhoneFactor™ SSL/TLS vulnerabilities documents and trace files referenced on the book website,
www.wiresharkbook.com
, were created by Steve Dispensa and Ray Marsh (
www.phonefactor.com
).
This book and the book website,
www.wiresharkbook.com
, references trace files from Mu Dynamics
(
www.pcapr.net
).
This book references rules released by Emerging Threats Copyright © 2003-2012, Emerging Threats. All rights
reserved. For more information, visit
emergingthreats.net
.
Protocol Analysis Institute, Inc.
5339 Prospect Road, # 343
San Jose, CA 95129 USA
www.wiresharkbook.com
Also refer to Chappell University at the same address
info@chappellU.com
www.chappellU.com
Cover: Fractal image,
Waves Envisioned during Late Nights at Work
, by Scott Spicer
Created with Apophysis 2.09
Dedication
This Second Edition is dedicated to Gerald Combs, creator of Wireshark (formerly Ethereal) and a good friend.
Twelve years ago, I sent Gerald a note—just out of the blue—"may I include Ethereal on my CD? I want to
give it away at conferences." Expecting some pushback—after all, he didn’t know who the heck I was—I was
amazed and thrilled to receive his response stating "sure, go ahead—that would be great!"
Gerald is more than the creator of Wireshark. Gerald is one of us. He struggled with a problem. He formulated
a solution. Then he did something extraordinary—he shared his solution with the world. In his typical unselfish
mode, Gerald opened up his project for the contribution and participation of others.
Ethereal morphed into Wireshark, and Wireshark continued to mature. Wireshark has surpassed every other
network analyzer product in the industry to become the de facto standard for network traffic analysis.
In 2011 Wireshark was voted the #1 Security Tool on the
SecTools.org
Top 125 Network Security Tools survey
(conducted by Gordon Lyons, creator of Nmap). This is a much deserved recognition that Wireshark and
packet analysis is a must-have skill for IT security professionals.
Throughout Wireshark’s rise in popularity, Gerald has remained one of the most honest, humble, dedicated
- 1
- 2
- 3
- 4
前往页