¸ê¦w±M®a½ÍWireshark¡UWireshark»PMetasploit¾ã¦XÀ³¥Î ( ÁcÅé ¦r) |
§@ªÌ¡GJessey Bullock, Jeff T. Parker | Ãþ§O¡G1. -> ¦w¥þ -> ºô¸ô¦w¥þ -> Àb«È§ðÀ»»P¤J«I |
ĶªÌ¡G¦¿´ò®ü |
¥Xª©ªÀ¡GùÖ®p¥Xª© | 3dWoo®Ñ¸¹¡G 49484 ¸ß°Ý®ÑÄy½Ð»¡¥X¦¹®Ñ¸¹¡I¡i¯Ê®Ñ¡j NT©w»ù¡G 480 ¤¸ §é¦©»ù¡G 360 ¤¸
|
¥Xª©¤é¡G7/9/2018 |
¶¼Æ¡G306 |
¥úºÐ¼Æ¡G0 |
|
¯¸ªø±ÀÂË¡G |
¦L¨ê¡G¶Â¥Õ¦L¨ê | »y¨t¡G ( ÁcÅé ª© ) |
|
¥[¤JÁʪ«¨® ¢x¥[¨ì§Úªº³Ì·R (½Ð¥ýµn¤J·|û) |
ISBN¡G9789864768660 |
§@ªÌ§Ç¡@|¡@ĶªÌ§Ç¡@|¡@«e¨¥¡@|¡@¤º®e²¤¶¡@|¡@¥Ø¿ý¡@|¡@§Ç |
(²Åé®Ñ¤W©Òz¤§¤U¸ü³sµ²¯Ó®É¶O¥\, ®¤¤£¾A¥Î¦b¥xÆW, YŪªÌ»Ýn½Ð¦Û¦æ¹Á¸Õ, ®¤¤£«OÃÒ) |
§@ªÌ§Ç¡G |
ĶªÌ§Ç¡G |
«e¨¥¡G |
¤º®e²¤¶¡GWireshark¬O¤@®MÀ³¥Î¼sªx¡]¥]¬A¸ê¦w»â°ì¡^ªººô¸ô¤ÀªR¤u¨ã¡A¥¦¥i¥HÀ°§U±z¹d²ÓÃû¿òªºÀ˵øºô¸ô¡AÂ×´Iªº¥\¯à»P¤ä´©ÅýWireshark¦¨¬°µL»ùªº¸ê¦w¤u¨ã¡A¦ý¤]¦]¦¹Åý·s¤â«o¨B¡C¥»®Ñ¥i¥HÀ°§U±z§Ö³t¤W¤â¡A¾Ç·|¦p¦ó§Q¥ÎWireshark©M¬ÛÃö¤u¨ã (¦pTShark)¡B»{ÃÑMetasploit³oÓµÛ¦Wªºº¯³z´ú¸Õ®Ø¬[¡A¥H¤Î§Q¥ÎLuaÅýWiresharkµo´§§ó¤jªº«Â¤O¡C¥»®Ñ²[»\§ðÀ»»P¨¾¿m§Þ³N»P¤u¨ãªº±´°Q¡A¥i¥HÀ°§U±z¡G¡D¤F¸ÑWireshare¤Î¬ÛÃö¤u¨ãªº°ò¦¾Þ§@¡D¾Ç²ß¦p¦ó¨Ï¥ÎLua¸}¥»¨ÓÂX¥RWiresharkªº¥\¯à¡D§Q¥ÎWireshark¶i¦æ§ðÀ»»P¨¾¿m§Þ³Nªº¬ã¨s¡D³z¹LKali Linux¶i¦æº¯³z´ú¸Õªº¹ê¾Ôºt½m¡D§Q¥ÎDocker«Ø¸m¤@Ó¼ÒÀÀ¯u¹ê°Ó·~ºô¸ôªºµêÀÀÀô¹Ò¡D§Q¥ÎMitM§Þ³N§ì¨ú«Ê¥]ªº§Þ¥©¡Dקïì©l½X¨Ó±j¤Æ±zªº¤u¨ã¶° |
¥Ø¿ý¡GChapter 1 Wireshark ²¤¶ ¤°»ò¬OWireshark¡H Wiresharkªº¨Ï¥ÎªÌ¬É± ¹LÂo¾¹ ½Ò«á²ßÃD
Chapter 2 «Ø¸m¹êÅçÀô¹Ò Ãö©óKali Linux µêÀÀ¤Æ§Þ³N VirtualBox W4SP¹êÅçÀô¹Ò ¾Ç²ßºKn ½Ò«á²ßÃD
Chapter 3 ¥²³Æªº°ò¦²z½× ºô¸ô§@·~ì²z ¦w¥þ©Ê ¤ÀªR«Ê¥]©M¨ó©w ¾Ç²ßºKn ½Ò«á²ßÃD
Chapter 4 Â^¨úºô¸ô«Ê¥] ¶i¦æ¶å±´ »Pºô¸ô¹L©Û Ū¨ú©MÀx¦sÂ^¨úªºÀÉ®× ¸Ñå¾¹ À˵ø§O¤HÂ^¨úªº«Ê¥] ¾Ç²ßºKn ½Ò«á²ßÃD
Chapter 5 ¶EÂ_§ðÀ»¦æ¬° §ðÀ»Ãþ«¬¡G¤¤¶¡¤H§ðÀ»¡H §ðÀ»Ãþ«¬¡GªýÂ_ªA°È §ðÀ»Ãþ«¬¡G¶i¶¥«ùÄò«Â¯Ù ¾Ç²ßºKn ½Ò«á²ßÃD
Chapter 6 §ðÀ» Wireshark §ðÀ»¤èªk½× §Q¥ÎWireshark¶i¦æ°»¹î ³WÁ×IPS/IDS°»´ú º|¬}§Q¥Î ³z¹LSSH¶i¦æ»·ºÝÂ^¨ú ¾Ç²ßºKn ½Ò«á²ßÃD
Chapter 7 Wireshark ºî¦XÀ³¥Î ¸Ñ±KSSL/TLS¬y¶q USB»PWireshark ø»sºô¸ô¹Ï ¾Ç²ßºKn ½Ò«á²ßÃD
Chapter 8 ¨Ï¥ÎLua½s¼g¸}¥» ¬°¤°»ò¿ï¾Ü Lua¡H ¼¶¼g¸}¥»ªº°ò¦ª¾ÃÑ ³]©wÀô¹Ò ÀˬdTools¥\¯àªí «Ø¥ßWireshark¸Ñå¾¹ ÂX¥RWireshark¥\¯à ¾Ç²ßºKn |
§Ç¡G |