With the techniques in this book, you can safely use honeypots inside your network to detect adversaries before they accomplish their goals. IDH redefines the role of honeypots and demonstrates why they are a critical facet of network defense. Practical Packet Analysis (Third Edition) will teach you to make sense of your packet captures so that you can better troubleshoot network problems and investigate security incidents.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A Bluetooth 5 and 4.x sniffer using TI CC1352/CC26x2 hardware with advanced features and Python-based host-side software.
A userland implementation of the Network Block Device protocol that enables remote block device access over network connections for distributed storage and virtualization use cases.
A website scanner that provides a sandbox for the web, allowing users to scan URLs and websites for potential threats and vulnerabilities.
A free, open-source network protocol analyzer for capturing and displaying packet-level data.
WiGLE.net is a platform that collects and provides data on WiFi networks and cell towers, with over 1.3 billion networks collected.
A blog sharing packet capture files and malware samples for training and analysis, with archived posts and traffic analysis exercises.
A TCP-based traceroute implementation that bypasses firewall filters to trace the path to a destination.
A suite for man in the middle attacks, featuring sniffing of live connections, content filtering, and protocol dissection.