Summary

In this chapter, we moved our skills up a notch. We learned how to analyze the captured packets to see what is happening on the network. We also studied how to see the traffic from the specific IP addresses as well as protocol-specific traffic. We also understood how to look for specific traffic based on keywords. Files, private credentials, and images have been examined to identify activities of interest. We have now become a lot better at investigating network activity.

In the next chapter, we are going to expand our skills and further our understanding of wireless networks, their security, as well as the common attacks that are out there. We will also look at how to sniff traffic and analyze it from our perspective.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.149.19