Exploring wireless, protocols, and possible threats

While there are many tools that are similar to those found in Wireshark, this last grouping contains an analysis tool unique to CS, which is Threat Assessments. This tool will allow you to run your capture and see whether any suspicious packets are flagged. 

This last section covers the following tools:

  • HTTP Analysis: This lists all of the URLs requested in the capture file, along with a count of the requests. 
  • Decode Protocol As: If CS doesn't decode the protocol correctly, you can provide values so that CS can properly decode the protocol. 

  • Wireless Networks: This provides a list of any wireless networks found in the file along with a sortable summary of the following: BSSID, SSID, vendor, Signal_dBm, channel, and security.
  • Wireless Keys: This will open a dialog box to add any decryption keys for the wireless networks in the file.
  • Threat Assessments: This is a more advanced option that will scan the capture for potentially malicious traffic within it. If none are found, the report will come back with the all clear!

Now that you have seen the many ways in which you can analyze data using CS, let's take a look at where you can get packet captures to strengthen your analysis skills.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.119.118.99