100% found this document useful (2 votes)
2K views

Learn Wireshark: A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark Lisa Bock 2024 scribd download

troubleshooting

Uploaded by

tocrenuddin
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
2K views

Learn Wireshark: A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark Lisa Bock 2024 scribd download

troubleshooting

Uploaded by

tocrenuddin
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 65

Experience Seamless Full Ebook Downloads for Every Genre at textbookfull.

com

Learn Wireshark: A definitive guide to expertly


analyzing protocols and troubleshooting networks
using Wireshark Lisa Bock

https://textbookfull.com/product/learn-wireshark-a-
definitive-guide-to-expertly-analyzing-protocols-and-
troubleshooting-networks-using-wireshark-lisa-bock/

OR CLICK BUTTON

DOWNLOAD NOW

Explore and download more ebook at https://textbookfull.com


Recommended digital products (PDF, EPUB, MOBI) that
you can download immediately if you are interested.

Network Analysis Using Wireshark 2 Cookbook: Practical


recipes to analyze and secure your network using Wireshark
2, 2nd Edition Nagendra Kumar Nainar
https://textbookfull.com/product/network-analysis-using-
wireshark-2-cookbook-practical-recipes-to-analyze-and-secure-your-
network-using-wireshark-2-2nd-edition-nagendra-kumar-nainar/
textboxfull.com

Practical Packet Analysis Using Wireshark to Solve Real


World Network Proble 3rd Edition Safari

https://textbookfull.com/product/practical-packet-analysis-using-
wireshark-to-solve-real-world-network-proble-3rd-edition-safari/

textboxfull.com

A Guide to Software Managing Maintaining and


Troubleshooting Jean Andrews

https://textbookfull.com/product/a-guide-to-software-managing-
maintaining-and-troubleshooting-jean-andrews/

textboxfull.com

Learn Data Science Using SAS Studio: A Quick-Start Guide


Engy Fouda

https://textbookfull.com/product/learn-data-science-using-sas-studio-
a-quick-start-guide-engy-fouda/

textboxfull.com
Troubleshooting Electronic Circuits: A Guide to Learning
Analog Electronics 1st Edition Ronald Quan

https://textbookfull.com/product/troubleshooting-electronic-circuits-
a-guide-to-learning-analog-electronics-1st-edition-ronald-quan/

textboxfull.com

Sociometrics And Human Relationships Analyzing Social


Networks To Manage Brands Predict Trends And Improve
Organizational Performance Peter A. Gloor
https://textbookfull.com/product/sociometrics-and-human-relationships-
analyzing-social-networks-to-manage-brands-predict-trends-and-improve-
organizational-performance-peter-a-gloor/
textboxfull.com

Programming Mathematics Using MATLAB 1st Edition Lisa A.


Oberbroeckling

https://textbookfull.com/product/programming-mathematics-using-
matlab-1st-edition-lisa-a-oberbroeckling/

textboxfull.com

Programming Mathematics Using MATLAB 1st Edition


Oberbroeckling Lisa A

https://textbookfull.com/product/programming-mathematics-using-
matlab-1st-edition-oberbroeckling-lisa-a/

textboxfull.com

Programming Mathematics Using MATLAB 1st Edition


Oberbroeckling Lisa A

https://textbookfull.com/product/programming-mathematics-using-
matlab-1st-edition-oberbroeckling-lisa-a-2/

textboxfull.com
Learn Wireshark
Second Edition

A definitive guide to expertly analyzing protocols and


troubleshooting networks using Wireshark

Lisa Bock

BIRMINGHAM—MUMBAI
Learn Wireshark
Second Edition
Copyright © 2022 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or
transmitted in any form or by any means, without the prior written permission of the publisher,
except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the
information presented. However, the information contained in this book is sold without warranty,
either express or implied. Neither the author, nor Packt Publishing or its dealers and distributors,
will be held liable for any damages caused or alleged to have been caused directly or indirectly by
this book.
Packt Publishing has endeavored to provide trademark information about all of the companies
and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing
cannot guarantee the accuracy of this information.

Group Product Manager: Vijin Boricha


Publishing Product Manager: Prachi Sawant
Content Development Editor: Romy Dias
Technical Editor: Rajat Sharma
Copy Editor: Safis Editing
Project Coordinator: Ashwin Dinesh Kharwa
Proofreader: Safis Editing
Indexer: Sejal Dsilva
Production Designer: Roshan Kawale
Marketing Coordinator: Sanjana Gupta

First Published: August 2019


Second Edition: June 2022

Production reference: 1010722


Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham
B3 2PB, UK.

ISBN 978-1-80323-167-9
www.packt.com
To all dreamers, know that there isn't always a clear path to achieving your dream.
In addition to celebrating and rejoicing each milestone, there will be times of
great sorrow and despair along the way. Nonetheless, keep moving toward your
dream while being authentic, harmonious, and true to yourself. One day you'll
see a sign, and you'll say to yourself with a smile, "I have arrived."
Contributors
About the author
Lisa Bock is an experienced author with a demonstrated history of working in the
e-learning industry. She is a security ambassador with a broad range of IT skills and
knowledge, including Cisco security, CyberOps, Wireshark, biometrics, ethical hacking,
and the IoT. Lisa is an author for LinkedIn Learning and an award-winning speaker who
has presented at several national conferences. She holds an MS in computer information
systems/information assurance from UMGC. Lisa was an associate professor in the IT
department at Pennsylvania College of Technology (Williamsport, PA) from 2003 until
her retirement in 2020. She is involved with various volunteer activities, and she and her
husband, Mike, enjoy bike riding, watching movies, and traveling.

I want to thank my friends and family for their ongoing support. I am


also grateful to the entire Packt team, who work very hard to create an
exceptional product. Finally, I'd like to thank my students, who push me to
deliver the very best educational content.
About the reviewer
Nick Parlow is a Fujitsu Fellow and Distinguished Engineer, and has been an escalation
engineer for Fujitsu in the UK for nearly 20 years, specializing in messaging technologies
and networks. He has fixed stuff for central government, the Ministry of Defence, and
his local school. He has master's degrees in network engineering from Sheffield Hallam
University and software engineering from the University of Northumbria.
Nick is a Microsoft Certified Trainer and holds many other credentials, but is most proud
of being a Raspberry Pi Certified Educator and Code Club volunteer. When he's not
working, writing books, reviewing books, soldering things, or taking blurry photos of the
night sky, he likes to play with chainsaws.

I'd like to thank the author, Lisa Bock, and the team at Packt for giving me
the opportunity to do something that has been wholly enjoyable – reviewing
this great book. Most thanks, however, go to my long-suffering family and
colleagues for giving me the time and support to do so. Thank you, Chris,
Bryn, Jon, Caroline, Craig, and everybody else. You're brilliant.
Table of Contents
Preface

Part 1 Traffic Capture Overview


1
Appreciating Traffic Analysis
Reviewing packet analysis 4 Identifying where to
Exploring early packet sniffers  5 use packet analysis 17
Evaluating devices that Analyzing traffic on a LAN 17
use packet analysis 6
Capturing network traffic 7 Outlining when to
use packet analysis 19
Recognizing who benefits Troubleshooting latency issues 19
from using packet analysis 8 Testing IoT devices 20
Assisting developers 8 Monitoring for threats 20
Helping network administrators Baselining the network 21
monitor the network 9
Educating students on protocols 12 Getting to know Wireshark 22
Alerting security analysts to threats 13 Summary  23
Arming hackers with information 14 Questions24

2
Using Wireshark
Examining the Finding information 34
Wireshark interface 28
Understanding the phases of
Streamlining the interface 28
packet analysis 34
Discovering keyboard shortcuts 31
Gathering network traffic 34
Recognizing the Wireshark authors  32
Decoding the raw bits 37
viii Table of Contents

Displaying the captured data 38 Dissecting protocols 44


Analyzing the packet capture 41
Summary 45
Using CLI tools with Wireshark 42 Questions46
Exploring tshark 42

3
Installing Wireshark
Discovering support for Beginning the installation 58
different OSes 50 Choosing components 58
Using Wireshark on Windows 50 Creating shortcuts and selecting
Running Wireshark on Unix  50 an install location 62
Installing Wireshark on macOS 51 Capturing packets and completing
the installation 63
Deploying Wireshark on Linux 51
Working with Wireshark Reviewing available resources 65
on other systems 52
Viewing news and help topics 65
Comparing different Evaluating download options 67
capture engines 54
Summary69
Understanding libpcap 54
Questions69
Examining WinPcap 54
Grasping Npcap 55 Further reading 71

Performing a standard
Windows installation 58

4
Exploring the Wireshark Interface
Opening the Wireshark Printing packets and closing Wireshark 82
welcome screen 74
Discovering the Edit menu 84
Selecting a file 74
Copying items and finding packets 84
Capturing traffic 75
Marking or ignoring packets 88
Exploring the File menu 76 Setting a time reference 89
Opening a file, closing, and saving 77 Personalizing your work area 90
Exporting packets, bytes, and objects 78
Exploring the View menu 91
Table of Contents ix

Enhancing the interface 91 Refreshing the view 98


Formatting time and name resolution 93
Modifying the display 96
Summary101
Questions101

Part 2 Getting Started with Wireshark


5
Tapping into the Data Stream
Reviewing network Comparing conversations and
architectures108 endpoints119
Comparing different types of networks 108
Realizing the importance
Exploring various types of media 110 of baselining 123
Learning various Planning the baseline 123
capture methods 113 Capturing traffic 123
Providing input 114 Analyzing the captured traffic 124
Directing output 114 Saving the baselines 125
Selecting options 116
Summary126
Tapping into the stream 118 Questions 127

6
Personalizing the Interface
Personalizing the layout  130 Adding, editing, and deleting columns 141
Altering the appearance 130 Refining the font and colors 145
Changing the layout 132
Adding comments 148
Creating a tailored Attaching comments to files 148
configuration profile 136 Entering packet comments 148
Customizing a profile 136 Viewing and saving comments 149
Crafting buttons 139
Summary 150
Adjusting columns, Questions 151
font, and colors 141
x Table of Contents

7
Using Display and Capture Filters
Filtering network traffic 154 Understanding the
Analyzing traffic 154 expression builder 168
Comparing the filters' files 156 Building an expression 170

Comprehending display filters 159 Discovering shortcuts


Editing display filters 160 and handy filters 172
Using bookmarks 161 Embracing filter shortcuts 172
Applying useful filters 175
Creating capture filters 162
Modifying capture filters 164 Summary 177
Bookmarking a filter 168 Questions 177
Further reading 179

8
Outlining the OSI Model
An overview of the OSI model 182 Traveling over the Physical layer 197
Developing the framework 182
Exploring the
Using the framework 183
encapsulation process 198
Discovering the purpose Viewing the data 199
of each layer, the protocols, Identifying the segment 199
and the PDUs 183 Characterizing the packet 200
Evaluating the Application layer 185 Forming the frame 200
Dissecting the Presentation layer 186
Demonstrating frame
Learning about the Session layer 188
formation in Wireshark 201
Appreciating the Transport layer 190
Examining the network bindings 202
Explaining the Network layer 193
Examining the Data Link layer 196 Summary203
Questions203
Table of Contents xi

Part 3 The Internet Suite TCP/IP


9
Decoding TCP and UDP
Reviewing the transport layer 210 Dissecting the window size 229
Describing TCP 211 Viewing additional header values 232

Establishing and maintaining a Understanding UDP 234


connection211
Studying a single UDP frame 235
Exploring a single TCP frame 214
Discovering the four-field
Examining the 11-field TCP
UDP header 236
header219
Analyzing the UDP header fields 236
Exploring TCP ports 220
Sequencing bytes 222 Summary 237
Acknowledging data 225 Questions238
Following the flags 228
Further reading 239

10
Managing TCP Connections
Dissecting the Permitting SACK 257
three-way handshake 242 Using timestamps 259
Isolating a single stream 243
Understanding TCP
Identifying the handshake packets 248
protocol preferences 260
Learning TCP options 252 Modifying TCP preferences 262
Grasping the EOL option 254
Tearing down a connection 264
Using NOP 254
Defining the MSS 255
Summary266
Scaling the WS 256 Questions266
Further reading 268
xii Table of Contents

11
Analyzing IPv4 and IPv6
Reviewing the network layer 270 Editing protocol preferences 287
Understanding the purpose of IP 271 Reviewing IPv4 preferences 287
Adjusting preferences for IPv6 290
Outlining IPv4 272
Dissecting the IPv4 header 273 Discovering tunneling protocols291
Modifying options for IPv4 282 Summary292
Exploring IPv6 282 Questions293
Navigating the IPv6 header fields 283 Further reading 295

12
Discovering ICMP
Understanding the purpose of Providing information using ICMPv6 312
ICMP298
Evaluating type and code values315
Understanding the ICMP header 299
Reviewing ICMP type and code values 315
Investigating the data payload 302
Defining ICMPv6 type and code values 317
Dissecting ICMP and ICMPv6 305
Configuring firewall rules 318
Reviewing ICMP 305
Acting maliciously 318
Outlining ICMPv6 306
Allowing only necessary types 323
Sending ICMP messages 307
Summary324
Reporting errors on the network 308
Issuing query messages 311
Questions324
Further reading 326

Part 4 Deep Packet Analysis of


Common Protocols
13
Diving into DNS
Recognizing the Mapping an IP address 330
purpose of DNS  330 Types of DNS servers 333
Table of Contents xiii

Transporting DNS 335 Evaluating queries and


responses 345
Comparing types
Caching a response 346
and classes of RRs 336
Calculating response times 347
Breaking down DNS types  336
Testing using nslookup 351
Examining the RR structure 337
Securing DNS 353
Reviewing the DNS packet 338 Summary 354
Examining the header  339
Questions 354
Dissecting the packet structure 343
Outlining the query section 344
Further reading 356

14
Examining DHCP
Recognizing the purpose of Understanding DHCP messages 375
DHCP  360 Comparing DHCP options 376
Configuring the client's IP address 361
Following a DHCP example  377
Using a DHCP relay agent 361
Releasing an IP address 377
Working with IPv6 addresses 363
Broadcasting a discover packet 379
Addressing security issues 365
Delivering an offer  380
Stepping through Requesting an IP address 382
the DORA process 366 Acknowledging the offer 383
Moving through DHCP states 366
Summary384
Obtaining an IP address 367
Leasing an IP address 370 Questions 385
Further reading 387
Dissecting a DHCP header 372
Examining DHCP field values 373

15
Decoding HTTP
Describing HTTP 390 Keeping track of the connection394
Dissecting a web page 390 Evaluating connection types  395
Understanding HTTP versions 393 Maintaining state with cookies  396
Recognizing HTTP methods 394
Comparing request and
response messages  398
xiv Table of Contents

Viewing an HTTP request 398 Responding to the client 407


Responding to the client 400 Ending the conversation 412

Following an HTTP stream 402 Summary  412


Beginning the conversation 405 Questions413
Requesting data  406 Further reading 414

16
Understanding ARP
Understanding the role and Reversing ARP 427
purpose of ARP 418 Evaluating InARP 428
Resolving MAC addresses 419 Issuing a gratuitous ARP 430
Investigating an ARP cache 421 Working on behalf of ARP 430
Replacing ARP with NDP in IPv6 423
Comparing ARP attacks and
Exploring ARP headers defense methods 432
and fields 423 Comparing ARP attacks and tools 432
Identifying a standard ARP Defending against ARP attacks 435
request/reply  423
Summary436
Breaking down the ARP header fields 425
Questions 437
Examining different types Further reading 438
of ARP 427

Part 5 Working with Packet Captures


17
Determining Network Latency Issues
Analyzing latency issues 442 Common transmission errors 450
Grasping latency, throughput, and
Discovering expert information 454
packet loss 442
Viewing the column headers 456
Learning the importance of time values446
Assessing the severity 457
Understanding coloring rules 447 Organizing the information 458
Exploring the
Summary461
Intelligent Scrollbar 449
Questions462
Table of Contents xv

18
Subsetting, Saving, and Exporting Captures
Discovering ways Recognizing ways to
to subset traffic 466 export components 477
Dissecting by an IP address 467 Selecting specified packets 478
Narrowing down by conversations 470 Exporting various objects 480
Minimizing by port number 471
Breaking down by protocol 472
Identifying why and how
to add comments 482
Subsetting by stream 473
Providing file and packet comments 482
Understanding options Saving and viewing comments 484
to save a file 474
Using Save as 476
Summary 487
Questions 487

19
Discovering I/O and Stream Graphs
Discovering the Statistics menu 492 Comparing TCP stream graphs 506
Viewing general information 493 Using time sequence graphs  506
Assessing protocol effectiveness 494 Determining throughput  512
Graphing capture issues 497 Assessing Round Trip Time 514
Evaluating window scaling  515
Creating I/O graphs 499
Examining errors 500 Summary 517
Graphing duplicate ACKs 501 Questions 517
Modifying the settings 502
Exploring other options 504

20
Using CloudShark for Packet Analysis
Discovering CloudShark 522 Outlining the various
Modifying the preferences 523 filters and graphs 532
Uploading captures 525 Displaying data using filters 533
Working with capture files 526 Viewing data using graphs 534
xvi Table of Contents

Evaluating the different Locating sample captures 544


analysis tools 537 Examining captures 544
Following the stream and viewing Finding more captures 546
conversations 538
Viewing packet lengths and Summary 546
VoIP activity 540 Questions 547
Exploring HTTP analysis Further reading 548
and wireless traffic  541
Monitoring possible threats 542
Assessments
Index
Other Books You May Enjoy
Preface
In the early 2000s, a coworker introduced me to Ethereal, the precursor to Wireshark.
I remember looking at the screen as my laptop gobbled up traffic and thinking, "I don't
know what this is, but I want to know!" Over the next few years, I immersed myself in
learning as much as possible about packet analysis using Wireshark. I attended training,
watched videos, and read books that helped me compile and curate my knowledge and
respect for what the packets tell us.
I have taught network and security courses and presented at conferences about the many
benefits of using Wireshark. In this second edition of Learn Wireshark, I want to share my
knowledge with you. Each chapter has multiple opportunities for a hands-on approach.
Using the examples, you will make sense of the data and understand what the packets
are telling you. I'll outline how to conduct a detailed search, follow the data stream, and
identify endpoints so that you can troubleshoot latency issues and actively recognize
network attacks. Join me on this journey, and you'll soon realize that the ability to
understand what's happening on the network is a superpower!

Who this book is for


This book is for network administrators, security analysts, students, teachers, and anyone
interested in learning about packet analysis using Wireshark. Basic knowledge of network
fundamentals, devices, and protocols, along with an understanding of different topologies,
will be beneficial as you move through the material.

What this book covers


Chapter 1, Appreciating Traffic Analysis, describes the countless places and reasons to
conduct packet analysis. In addition, we'll cover the many benefits of using Wireshark, an
open source protocol analyzer that includes many rich features.
Chapter 2, Using Wireshark, starts with an overview of the beginnings of today's
Wireshark. We'll examine the interface and review the phases of packet analysis. Finally,
we'll cover the built-in tools, with a closer look at tshark (or terminal-based Wireshark),
a lightweight alternative to Wireshark.
xviii Preface

Chapter 3, Installing Wireshark, illustrates how Wireshark provides support for different
operating systems. We'll compare the different capture engines, such as WinPCap,
LibPcap, and Npcap, walk through a standard Windows installation, and then review the
resources available at https://www.wireshark.org/.
Chapter 4, Exploring the Wireshark Interface, provides a deeper dive into some of the
common elements of Wireshark to improve your workflow. We'll investigate the welcome
screen and common menu choices, such as File, Edit, and View, so that you can easily
navigate the interface during an analysis.
Chapter 5, Tapping into the Data Stream, starts with a comparison of the different network
architectures and then moves on to the various capture options. You'll discover the
conversations and endpoints you'll see when tapping into the stream, and then learn about
the importance of baselining network traffic.
Chapter 6, Personalizing the Interface, helps you to realize all the ways you can customize
the many aspects of the interface. You'll learn how to personalize the layout and general
appearance, create a tailored configuration profile, adjust the columns, font, and color, and
create buttons.
Chapter 7, Using Display and Capture Filters, helps you to make examining a packet
capture less overwhelming. We'll take a look at how to narrow your scope by filtering
network traffic. We'll compare and contrast display and capture filters, discover the
shortcuts used to build filters, and conclude with a review of the expression builder.
Chapter 8, Outlining the OSI Model, provides an overview of the Open Systems
Interconnection (OSI) model, a seven-layer framework that outlines how the OS prepares
data for transport on the network. We'll review the purpose, protocols, and Protocol Data
Units (PDUs) of each layer, explore the encapsulation process, and demonstrate the frame
formation in Wireshark.
Chapter 9, Decoding TCP and UDP, is a deep dive into two of the key protocols in the
transport layer – the Transmission Control Protocol (TCP) and the User Datagram
Protocol (UDP). We'll review the purpose of the transport layer and then evaluate the
header and field values of both the TCP and the UDP.
Chapter 10, Managing TCP Connections, begins by examining the three-way handshake.
We'll discover the TCP options, get a better understanding of the TCP protocol
preferences, and then conclude with an overview of the TCP teardown process.
Chapter 11, Analyzing IPv4 and IPv6, provides a breakdown of the purpose of the Internet
Protocol (IP). We'll outline IPv4 and the header fields and then explore the streamlined
header of IPv6. We'll summarize with a discussion of the protocol preferences and see
how IPv4 and IPv6 can coexist by using tunneling protocols.
Preface xix

Chapter 12, Discovering ICMP, details the purpose of the Internet Control Message
Protocol (ICMP). We'll dissect ICMP and ICMPv6, compare query and error messages,
and discuss the ICMP type and code values. We'll cover how ICMP can be used in
malicious ways and outline the importance of configuring firewall rules.
Chapter 13, Diving into DNS, outlines the significance of the Domain Name System
(DNS). You'll learn how DNS works when resolving a hostname to an IP address. We'll
compare the different types of records, step through a query and response, review the
DNS header, and calculate the DNS response time using Wireshark.
Chapter 14, Examining DHCP, begins by explaining the need for the Dynamic Host
Configuration Protocol (DHCP). We'll then outline the DORA process – Discover Offer
Request Acknowledge. We'll dissect a DHCP header and review all the field values, flags,
and port numbers, and then finish by stepping through a DHCP example.
Chapter 15, Decoding HTTP, highlights the Hypertext Transfer Protocol (HTTP),
an application layer protocol used when browsing the web. We'll learn the details of
HTTP, explore common methods of transport, and dissect the header and fields. We'll
then compare request and response messages, and then summarize by following an
HTTP stream.
Chapter 16, Understanding ARP, takes a closer look at the Address Resolution Protocol
(ARP), which is a significant protocol in delivering data. We'll outline the role and
purpose of ARP, explore the header and fields, describe the different types of ARP, and
take a brief look at ARP attacks.
Chapter 17, Determining Network Latency Issues, outlines how even a beginner can
diagnose network problems. We'll explore coloring rules and the Intelligent Scrollbar, and
then conclude with an overview of the expert information, which divides the alerts into
categories and guides you through a more targeted evaluation.
Chapter 18, Subsetting, Saving, and Exporting Captures, helps you to explore the many
different ways in which to break down a packet capture into smaller files for analysis. We'll
cover the different options when saving a file, discover ways to export components such as
objects, session keys, and packet bytes, and then outline why and how to add comments.
Chapter 19, Discovering I/O and Stream Graphs, begins by covering the many ways the
statistics menu can help us when analyzing a capture file. We'll create basic I/O graphs to
help visualize network issues and summarize by comparing how the different TCP stream
graphs provide a visual representation of the streams.
xx Preface

Chapter 20, Using CloudShark for Packet Analysis, covers CloudShark, an online
application that is similar to Wireshark. You'll learn how to filter traffic and generate
graphs. We'll then review how you can share captures with colleagues and outline where
you can find sample captures so that you can continue improving your skills.

To get the most out of this book


To prepare for working with Wireshark, download and install the latest version on your
system. Detailed instructions are listed in Chapter 3, Installing Wireshark.
To get the most out of each chapter, when there is a reference to a packet capture,
download the files so that you can follow along with the lessons.
In addition to this, practice your skills on your own and, in particular, review the common
protocols in the TCP/IP suite so that you can deepen your knowledge and become more
proficient in packet analysis.

Download the example code files


All Wireshark capture files are referenced within the book. Download the appropriate
capture files from the online repositories so that you can follow along with the lessons.

Download the color images


We also provide a PDF file that has color images of the screenshots and diagrams used in
this book. You can download it here: https://packt.link/iF8Fj.

Conventions used
There are a number of text conventions used throughout this book.
Code in text: Indicates code words in text, database table names, folder names,
filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles.
Here is an example: "To write to a file, use -w, then the filename and path."
Any command-line input or output is written as follows:

C:\Program Files\Wireshark>tshark -i "ethernet 2" -w Test-


Tshark.pcap -a duration:10
Preface xxi

Bold: Indicates a new term, an important word, or words that you see onscreen. For
instance, words in menus or dialog boxes appear in bold. Here is an example: "Once
you're in CloudShark, select the Export | Download File drop-down menu."

Tips or Important Notes


Appear like this.

Get in touch
Feedback from our readers is always welcome.
General feedback: If you have questions about any aspect of this book, email us
at customercare@packtpub.com and mention the book title in the subject of
your message.
Errata: Although we have taken every care to ensure the accuracy of our content,
mistakes do happen. If you have found a mistake in this book, we would be grateful if
you would report this to us. Please visit www.packtpub.com/support/errata
and fill in the form.
Piracy: If you come across any illegal copies of our works in any form on the internet,
we would be grateful if you would provide us with the location address or website name.
Please contact us at copyright@packt.com with a link to the material.
If you are interested in becoming an author: If there is a topic that you have expertise
in and you are interested in either writing or contributing to a book, please visit
authors.packtpub.com.

Share Your Thoughts


Once you've read Learn Wireshark - Second Edition, we'd love to hear your thoughts!
Please click here to go straight to the Amazon review page for this book and share
your feedback.
Your review is important to us and the tech community and will help us make sure we're
delivering excellent quality content.
Part 1
Traffic Capture
Overview

In this section, we’ll outline the value of traffic analysis, learn about the evolution of
Wireshark, and step through the phases of packet analysis. We’ll then discuss some of
the command-line interface tools, outline how to download and install Wireshark, and
explore the interface along with commonly accessed menu choices.
The following chapters will be covered under this section:

• Chapter 1, Appreciating Traffic Analysis


• Chapter 2, Using Wireshark
• Chapter 3, Installing Wireshark
• Chapter 4, Exploring the Wireshark Interface
1
Appreciating Traffic
Analysis
Today's networks are complex, and many times, when faced with issues, the only way you
can solve the problem is if you can see the problem. For that very reason, packet analysis,
using tools such as Wireshark, has been around for many years. In addition to manually
conducting packet analysis using Wireshark, today's devices incorporate the ability to
pull data from the network and examine its contents. This function helps the network
administrator to troubleshoot, test, baseline, and monitor the network for threats.
This chapter will help you to recognize the many benefits of using Wireshark for packet
analysis. You'll learn about its history as an exceptional open source software product,
which includes many rich features. You'll discover how various groups can benefit from
using packet analysis, such as network administrators, students, and security analysts. In
addition, we'll cover the many places in which to conduct packet analysis, including on
a Local Area Network (LAN), on a host, or in the real world. Finally, you'll learn how
Wireshark has the ability to decode hundreds of different protocols and is constantly
being improved, making it the optimal tool for monitoring the network.
4 Appreciating Traffic Analysis

In this chapter, we will address all of this by covering the following topics:

• Reviewing packet analysis


• Recognizing who benefits from using packet analysis
• Identifying where to use packet analysis
• Outlining when to use packet analysis
• Getting to know Wireshark

Reviewing packet analysis


Packet analysis examines packets to understand the characteristics and structure of
the traffic flow, either during a live capture or by using a previously captured file. The
analyst can complete packet analysis by either studying one packet at a time or as a
complete capture.
When monitoring the network for analysis, we capture traffic using specialized software
such as Wireshark or tshark. Once the data is captured and we save the file, the software
stores the data in a file that is commonly called a packet capture or PCAP file.
Packet analysis benefits many groups, including the following:

• Network administrators: Use packet analysis to gain information about current


network conditions.
• Security analysts: Use packet analysis to determine whether there is anything
unusual or suspicious about the traffic when carrying out a forensic investigation.
• Students: Use packet analysis as a learning tool to better understand the workings
of different protocols.
• Hackers: Use packet analysis to sniff network traffic while conducting footprinting
and reconnaissance in order to gain valuable information about the network.

We use packet analysis in many places, including on a LAN, on a host, or in the real world.
Additionally, we use packet analysis when troubleshooting latency issues, testing Internet
of Things (IoT) devices, and as a tool when baselining the network.
Today, packet analysis using Wireshark is a valuable skill. However, analyzing packets has
been around in the networking world for many years. As early as the 1990s, various tools
enabled analysts to carry out packet analysis on the network to troubleshoot errors and to
monitor server behavior. In the next section, we'll examine some of the early tools used to
monitor network activity.
Reviewing packet analysis 5

Exploring early packet sniffers


Packet analysis has been around in some form for over 20 years, as a diagnostic tool, to
observe data and other information traveling across the network. Packet analysis is also
referred to as sniffing. The term refers to early packet sniffers, which sniffed or captured
traffic as it traveled across the network. In the 1990s, Novell, a software company,
developed the Novell LANalyzer, which had a graphical UI and dashboard to examine
network traffic. Concurrently, Microsoft introduced its Network Monitor.
Over the last 20 years, there have been many other packet analyzers and tools to sniff
traffic, including the following:

Table 1.1 – Packet analyzers and tools


Most packet analyzers work in a similar manner. They capture data and then decode the
raw bits in the field values according to the appropriate Request for Comment (RFC) or
other specifications. Once done, the data is presented in a meaningful fashion.
Packet analysis tools range in appearance and functionality, as follows:

• They provide simple text-based analysis, such as terminal-based


Wireshark (tshark).
• They deliver a rich graphical UI with advanced artificial intelligence (AI)-based
expert systems that guide the analyst through a more targeted evaluation.

In the next section, we'll take a look at the various devices that use packet analysis today.
6 Appreciating Traffic Analysis

Evaluating devices that use packet analysis


Packet analysis and traffic sniffing are used by many devices on the network, including
routers, switches, and firewall appliances. As data flows across the network, the devices
gather and interpret the packet's raw bits and examine the field values in each packet to
decide on what action should be taken.
Devices examine network traffic in the following manner:

• A router captures the traffic and examines the IP header to determine where to
send the traffic, as part of the routing process.
• An IDS examines the traffic and alerts the network administrator if there is any
unusual or suspicious behavior.
• A firewall monitors all traffic and will drop any packets that are not in line with
the Access Control List (ACL).

For example, when data passes through a firewall, the device examines the traffic and
determines whether to allow or deny the packets according to the ACL.

Using an ACL
When using a firewall, an ACL governs the type of traffic that is allowed on the network.
For example, an ACL has the following entries:

• Allow outbound SYN packets. The destination port is 80.


• Allow inbound SYN-ACK packets. The source port is 80.

To decide whether to allow or deny a packet, the firewall must check each header as it
passes through the device. It will determine variables such as IP addresses, Transmission
Control Protocol (TCP) flags, and port numbers that are in use. If the packet does not
meet the ACL entry, the firewall will drop the packet. As shown in the following diagram,
an inbound SYN packet with a destination port of 80 is blocked because it does not match
the rule:
Other documents randomly have
different content
The Project Gutenberg eBook of The Mongols in
Russia
This ebook is for the use of anyone anywhere in the United States
and most other parts of the world at no cost and with almost no
restrictions whatsoever. You may copy it, give it away or re-use it
under the terms of the Project Gutenberg License included with
this ebook or online at www.gutenberg.org. If you are not located
in the United States, you will have to check the laws of the country
where you are located before using this eBook.

Title: The Mongols in Russia

Author: Jeremiah Curtin

Release date: January 20, 2024 [eBook #72764]

Language: English

Original publication: Boston: Little Brown & Company, 1908

Credits: Jeroen Hellingman and the Online Distributed Proofreading


Team at https://www.pgdp.net/ for Project Gutenberg
(This file was produced from images generously made
available by The Internet Archive/Canadian Libraries)

*** START OF THE PROJECT GUTENBERG EBOOK THE MONGOLS IN


RUSSIA ***
[Contents]

[Contents]

THE MONGOLS IN RUSSIA

[Contents]
Jeremiah Curtin in the Ruins of the Roman Forum
[Contents]
THE MONGOLS IN RUSSIA

BY
JEREMIAH CURTIN
AUTHOR OF “THE MONGOLS, A HISTORY,”
“MYTHS AND FOLK-LORE OF IRELAND,”
“HERO-TALES OF IRELAND,” “MYTHS AND
FOLK-TALES OF THE RUSSIANS, WESTERN
SLAVS, AND MAGYARS,” “CREATION MYTHS
OF PRIMITIVE AMERICA,” ETC.
BOSTON
LITTLE, BROWN, AND COMPANY
1908

[Contents]

Copyright, 1908,
By A. M. Curtin.

All rights reserved

Colonial Press
Electrotyped and Printed by C. H. Simonds & Co.
Boston, U. S. A.

[Contents]

THIS WORK
AS WAS ITS COMPANION VOLUME
The Mongols, A History
IS DEDICATED TO
Theodore Roosevelt
PRESIDENT OF THE UNITED STATES

[Contents]
NOTE

In gathering material for “The Mongols 📘” and “The Mongols


in Russia,” Mr. Curtin used the early chronicles of China, Persia,
and Russia. To obtain these chronicles he went several times
to Russia and once to the Orient. [ix]

[Contents]
CONTENTS

CHAPTER I PAGE

Kurultai held by Ogotai.—Sarai, the Mongol capital.—Patriarchal


system of Russia.—Rurik, 862.—Death of Rurik, 879.—Oleg,
successor of Rurik.—Askold and Dir.—Oleg takes Kief.—Expedition
against Constantinople.—First Russian treaty.—Death of Oleg, 912.—
Reign of Igor.—Attacks on the Byzantine Empire, 941, 944.—Murder
of Igor, 945.—Olga avenges the murder of her husband.—Reign of
Olga.—Succession of Sviatoslav, 957.—Olga receives Christianity.—
The Kazars.—Sviatoslav controls Bulgaria.—Kief attacked by
Petchenegs.—Death of Olga.—Sviatoslav divides his inheritance.—
Second war with Bulgaria.—Murder of Sviatoslav, 972.—Dispute
between the sons of Sviatoslav.—Yaropolk becomes master of
Russia.—Vladimir takes Polotsk.—Blud betrays Yaropolk.—Vladimir
becomes Prince of Kief.—Religion of Russia.—Marriage of Vladimir
with Anna, sister of the Greek Emperor.—Death of Vladimir, 1015.—
Vladimir’s twelve sons.—Sviatopolk seizes power.—Murder of Boris
and Glaib.—Defeat of Sviatopolk.—Sviatopolk seeks assistance in
Poland.—Sviatopolk defeated a second time.—Mystislav appears
before Kief.—Mystislav takes Novgorod.—Battle of Listven.—Yaroslav
enters Kief.—Yaroslav becomes Grand Prince, 1016.—Death of
Mystislav, 1035.—Yaroslav frames a code of laws.—Arranges the
succession.—Death of Yaroslav the Lawgiver, 1054.—Russia divided
between the sons of Yaroslav.—Izyaslav Prince of Kief.—Vseslav the
Wizard.—Vseslav imprisoned by Izyaslav.—Polovtsi cross the
boundary of Pereyaslavl, 1055.—Peace made by the Polovtsi.—
Polovtsi defeat the Russian princes.—Kief dissatisfied with Izyaslav.—
Kief reënstates Izyaslav.—Izyaslav driven from Kief a second time.—
Sviatoslav becomes Grand Prince.—Izyaslav’s son visits Rome.—
Polish king asks Pope Gregory to assist Izyaslav.—Monomach and
Glaib.—Polovtsi warriors employed for the first time.—Death of
Sviatoslav, 1076.—Death of Glaib.—Polovtsi led in by Oleg and Boris.
—Izyaslav, Yaropolk and Monomach march against Oleg.—Death of
Boris.—Death of Izyaslav.—Vsevolod becomes Grand Prince, 1078.—
Volodar and Vassilko.—Chernigoff given to Monomach.—Polovtsi
army sent against Vsevolod.—Death of Roman, 1079.—Trouble in
Volynia.—Traffic with Tsargrad.—Flight of Yaropolk.—Surrender of
Lutsk.—David, son of Igor, rules Volynia.—Galitch seized from the
King of Poland.—Death of Yaropolk, 1086 1

CHAPTER II

Death of Vsevolod, 1093.—Sviatopolk, Prince of Kief.—Conflict


between Sviatopolk and the Polovtsi.—Defeat of Sviatopolk.—Polovtsi
[x]attack Kief.—Polovtsi army led in by Oleg.—Siege of Chernigoff.—
Oleg master of Chernigoff.—Polovtsi Khans visit Pereyaslavl to sell
peace, both are killed.—Advance of Oleg against Murom.—Itlar and
Kitan, Polovtsi Khans, come to Pereyaslavl, 1095.—Death of Izyaslav.
—Murom receives Oleg.—Mystislav seizes Oleg’s officials.—Mystislav
pursues Oleg.—Defeat of Oleg.—Princes of Russia meet at Lubetch,
1097.—David suspicious of Monomach and Vassilko.—David explains
the plot to Sviatopolk.—Capture of Vassilko.—David blinds Vassilko.—
Volodar attacks David.—Vassilko seeks revenge.—Sviatopolk lays
siege to Vladimir.—Yaroslav goes to Hungary to find aid for Vassilko.
—Koloman of Hungary lays siege to Premysl.—Mystislav defends
Vladimir.—Death of Mystislav.—Vladimir men defeat David.—The
Russian princes meet at Vititchevo, 1100.—Monomach acts against
steppe tribes.—Defeat of the Polovtsi.—Expeditions against the
Polovtsi, 1110 and 1111.—Death of Sviatopolk, 1113.—Monomach
becomes Prince of Kief, 1113.—Monomach marches against Minsk,
1116.—Trouble in Volynia.—Monomach expels Yaroslav, and seats
Roman in Volynia.—Death of Roman.—Andrei, Roman’s successor.—
Kidnapping of Volodar.—Efforts of Vassilko to free his brother.—
Yaroslav, with Cheks, Poles and Hungarians, attacks Vladimir, 1123.—
Death of Yaroslav, 1123.—Death of Monomach, 1125.—Mystislav
succeeds Vladimir Monomach, 1125.—Yaroslav, son of Monomach,
founds the principality of Ryazan.—Mystislav frees himself of the
Polovtsi princes.—Yaroslav successor of Oleg of Chernigoff.—
Vsevolod opposes his uncle.—Yaroslav withdraws to Ryazan.—Death
of Mystislav, 1132.—Yaropolk successor of Mystislav, his brother.—
Mystislav’s sons rise against their uncle.—Vsevolod receives
Pereyaslavl from Mystislav.—Yuri Dolgoruki expels Vsevolod.—Pskoff
resolves to declare its independence.—Sviatoslav sent to attack
Pskoff.—Yuri Dolgoruki receives Gorodok.—Vsevolod seizes
Chernigoff.—Death of Yaropolk.—Vyacheslav successor of Yaropolk,
1150.—Vyacheslav drives Vsevolod from Kief.—Position of
Monomach’s descendants.—Vsevolod attacks his enemies separately.
—Yuri seizes Torjok 33

CHAPTER III

Death of Andrei.—Vyacheslav takes Pereyaslavl.—Vsevolod calls a


council.—Siege of Pereyaslavl by dissatisfied heirs.—Defeat of the
besiegers.—Vsevolod asks aid of Sviatosha.—Izyaslav obtains
Pereyaslavl.—Visit of Izyaslav to Yuri in Suzdal.—Position of the
descendants of Monomach and Oleg.—Death of Volodar and
Vassilko, 1124.—Quarrel between Vsevolod and Vladimirko.—
Vladimirko calls in Hungarians, 1127.—Vladimirko’s enemies grow
defiant.—Siege of Galitch.—Triumph of Vladimirko.—Vsevolod enters
Galitch (1146).—Position of Novgorod.—Vsevolod declares Igor his
successor, 1145.—Death of Vsevolod, 1146.—Igor remains with the
army and sends Sviatoslav to Kief.—Defeat of Igor.—Capture of
Sviatoslav.—Izyaslav enters Kief.—Power returns to Monomach’s
descendants.—Flight of Sviatoslav to Chernigoff.—Sviatoslav asks aid
of Yuri.—Effort of the sons of David to crush Sviatoslav.—Rostislav of
Murom attacks Yuri’s country.—The sons of David move on Putivl.—
Flight of Sviatoslav.—Sons of David resolve to kill Sviatoslav.—
Sviatoslav reaches the forests of Vyatichi.—Izyaslav leaves his sister’s
son in Chernigoff.—Yuri of Suzdal sends aid to Sviatoslav.—Death of
Ivan, son of Yuri.—Yuri invites Sviatoslav [xi]to meet him in Moskva
(Moscow), 1146.—The name Moscow appears for the first time in
history, 1146.—Izyaslav addresses his boyars.—Izyaslav sends
envoys to the sons of David.—Murder of Igor.—Glaib seizes Kursk.—
Struggle of Chernigoff princes against Izyaslav.—Rostislav deceives
the Kief people.—Novgorod assembles forces to march against Yuri.
—Izyaslav sends envoys to Sviatoslav.—Sviatoslav consults with Yuri.
—Yuri marches to Pereyaslavl.—Yuri sends a message to Izyaslav.—
The bishop begs Izyaslav to make peace.—Defeat and flight of
Izyaslav.—Izyaslav sends to Poland for aid.—Message of Izyaslav to
Vyatcheslav.—Vyatcheslav begs Yuri to make peace.—Yuri invests
Lutsk.—Yuri makes peace.—Izyaslav obtains aid from the Polovtsi.—
Vyatcheslav and Izyaslav rule Kief.—Yuri approaches Kief.—Flight of
Vyatcheslav and Izyaslav.—Izyaslav asks aid of the King of Hungary.
—Vladimirko lavishes gold on the Hungarians and they withdraw.—
Escape of Boris.—Kief welcomes Izyaslav.—Triumph of Vyatcheslav.—
Contest between Vyatcheslav and Yuri.—Yuri attacks Vyatcheslav.—
Defeat of Yuri.—Yuri takes oath not to attack Kief while it is held by
Izyaslav and his uncle.—Return of Yuri to Suzdal.—Yuri brings
Polovtsi legions to besiege Chernigoff.—Defeat of Yuri.—Triumph of
Izyaslav and his uncle 58

CHAPTER IV

Izyaslav and the King of Hungary attack Vladimirko, 1151.—Escape


of Vladimirko.—Vladimirko declares that he is dying and begs for
peace.—Izyaslav yields.—Vladimirko sends troops to help Yuri.—
Refusal of Vladimirko to fulfil promises.—Death of Vladimirko.—
Yaroslav successor of Vladimirko.—Battle at Terebovl.—Defeat of
Izyaslav.—Death of Izyaslav, 1154.—Rostislav succeeds his brother.—
Attack on Pereyaslavl.—Death of Vyatcheslav.—Defeat of Rostislav.—
Kief men call Izyaslav to the throne.—Peace between Yuri and
Rostislav.—Yuri meets an old friend.—Yuri enters Kief, 1155.—
Disaffection of Kief.—Death of Yuri, 1157.—Andrei carries the
miraculous image to Vladimir.—Founding of Bogolyuboff.—Mystislav
successor of Yuri.—Andrei marches against Mystislav, 1169.—
Destruction of Kief.—Andrei adorns Vladimir.—History of Vladimir.—
Suzdal and Rostoff jealous of Vladimir.—Enemies of Andrei.—
Methods of Andrei.—Pride of Novgorod.—Andrei attacks Bulgar.—
Triumph of Andrei.—Friendship of the Greek Emperor and the
Patriarch.—Andrei calls a council.—Asks the Patriarch to give Vladimir
a metropolitan.—Refusal of the Patriarch.—Marriage of Andrei.—
Youth of Andrei.—Murder and burial of Andrei, 1174.—Fear of the
boyars.—Execution of the murderers.—Andrei’s two nephews chosen
to succeed him.—Sviatoslav of Chernigoff displeased; insists that the
brothers of Andrei shall be associated with the nephews.—Boyars
masters in Vladimir.—Vladimir men send for Mihalko and Vsevolod,
and install them, 1176 88

CHAPTER V

Death of Mihalko, 1176.—Men of Vladimir kiss the cross to Vsevolod.


—Vsevolod gives Rostoff to Mystislav.—Mystislav invades Vladimir.—
Battle near Yurieff.—Flight of Mystislav.—Triumph of Vsevolod.—
Burning of Moscow.—Attack on Vladimir.—Seizure of Bogolyuboff by
Glaib.—Defeat of Mystislav and the Polovtsi.—Decision regarding
prisoners.—Blinding of Yaropolk and Mystislav.—Refusal of Glaib to
receive freedom with conditions.—Death of [xii]Glaib.—Importance of
Vladimir as a capital.—Activity of the Prince of Vladimir in Novgorod
affairs.—Defense of Novgorod against pagans.—Attempt of Mystislav
to punish Polovtsi.—Death of Mystislav.—Flight of Roman to the
steppes.—Submission of Ryazan.—Choice of Vladimir as Prince of
Novgorod.—Imprisonment of Glaib.—Efforts of Sviatoslav to liberate
his son.—Retreat of Sviatoslav.—Preparations of Rurik to seize Kief.—
Asks aid of Yaroslav Eight Minds.—March of Yaroslav and Igor from
Chernigoff.—Allies from Lithuania.—Desire of Smolensk to force
battle.—Attack of the Prince of Vladimir on Nova-Torg.—Peace is
made.—Defeat of Mohammedans.—Death of Izyaslav, son of Glaib.—
Party struggles in Novgorod.—Trouble in Ryazan.—Address of Big
Nest to Ryazan people.—Pronsk princes ask for assistance.—Retreat
from Kolomna.—Surrender of Pronsk.—Deceitful submission of
Roman.—Attack on Kolomna by the Prince of Vladimir.—Peace made
with Ryazan.—Accusations against Porfiri, the Chernigoff bishop.—
Sviatoslav invites all princes to join him in an expedition against the
Polovtsi.—A great victory.—Eight Minds, Prince of Galitch.—Triumph
of Sviatoslav.—March of Igor against the Polovtsi.—Defeat of Igor.—
Death of Glaib 111

CHAPTER VI

Death of Vladimir of Pereyaslavl.—Inheritance of Pereyaslavl by the


Prince of Vladimir.—Onrush of Polovtsi.—Grief of Igor.—Escape of
Igor from imprisonment among Polovtsi.—Polovtsi raids.—Decline of
Kief.—Influence of the Latins.—Death of Yaroslav Eight Minds, 1187.
—Anastasia, mistress of Eight Minds.—Bond between Galitch and
Hungary.—Vladimir, son of Eight Minds.—Marriage of Vladimir.—Flight
of Vladimir and his family.—Reception of Vladimir by Bela III.—
Seizure of Vladimir’s property by Roman.—Assistance given Roman
by Rurik of Smolensk.—Honor given King Bela in Galitch.—Bela takes
the title Rex Galiciæ.—Andrei, son of Bela, made king in Galitch.—
Position of Andrei in Galitch.—Rostislav invited to the throne of
Galitch.—Battle outside the capital.—Death of Rostislav.—Church
trouble in Galitch.—Dispute between Rurik and Sviatoslav.—Plans of
the Kief prince.—Escape of Vladimir of Galitch from imprisonment in
Hungary.—Vladimir begs aid of Barbarossa.—Barbarossa commands
Kazimir of Poland to assist Vladimir.—Vladimir enters Galitch with a
Polish army.—Flight of Andrei.—Decision of Chernigoff princes that
war alone can settle boundaries.—Death of Sviatoslav, 1194.—Rurik,
Prince of Kief.—Roman, son-in-law of Rurik.—Rurik feels the policy of
Big Nest.—Feast giving between Rurik and David.—Trouble between
Rurik and Big Nest.—Appeal to Nikifor, the metropolitan.—Roman
reproaches Rurik.—Roman seeks aid in Cracow.—Roman assists the
Poles.—Defeat of Roman.—Message from Big Nest and Rurik to the
descendants of Oleg.—Big Nest promises to march against
Chernigoff.—Victory of Chernigoff.—Rurik reproaches Big Nest.—Rurik
marches on Chernigoff.—Death of Vsevolod Buitur.—Message of
Rurik to the Galitch prince.—Council of Ryazan princes.—Demand of
Big Nest that Yaropolk should leave Novgorod.—Rurik reproaches Big
Nest.—Indifference of Big Nest.—Death of Rostislav, 1198.—Death of
Vladimir, son of Eight Minds.—Struggle between Bela of Hungary and
Roman.—Rule of Roman in Galitch.—Ingvar is seated on the Kief
throne.—Chermny and Rurik bring Polovtsi against Kief, 1204.—
Capture of Kief.—Rurik [xiii]again prince in Kief, 1205.—Campaign
against Polovtsi.—Rurik becomes a monk.—Rostislav prince in Kief.—
Meeting in Kief of the ruling princes.—Occupation of Lublin 133

CHAPTER VII

Death of Roman, 1205.—Rurik, the monk, again prince in Kief.—


Quarrels in Galitch.—Escape of Roman’s widow and children.—Desire
of Andrei to establish Daniel in Galitch, 1206.—Chermny leads troops
into Galitch.—Trouble with Galitch boyars.—Recall of Andrei.—
Satisfaction of Chermny.—Desire of the boyars to get possession of
Volynia.—Aid asked of Leshko by Roman’s widow, 1211.—Disorder in
Galitch and Volynia.—Trouble in Kief.—Rule of Chermny in the Kief
country, 1207.—Vassilko and Daniel.—Desire of Alexander Bailski to
rule in Volynia.—Ingvar claims Volynia.—Vassilko receives Brest.—
Quarrels of the sons of Igor.—Big Nest marches against Chermny.—
Quarrel of Big Nest and son.—Big Nest moves on Ryazan.—Ryazan
men beg for peace.—Crossing of the Oká.—Return of the army to
Vladimir, November, 1207.—Big Nest sends Yaroslav, his son, to
Ryazan as prince, 1208.—Intrigue of Glaib.—Burning of Ryazan and
Bailgorod.—Disorder increases in Galitch.—Expulsion of the sons of
Igor.—Coming of Benedict Bor.—Escape of Benedict Bor.—Volodislav,
a boyar, promises Galitch to Andrei of Hungary.—Reception of Daniel
by Galitch.—Triumph of Daniel.—Parting of Daniel and his mother.—
Establishment in Galitch of Roman’s widow.—Torture and exile of
Volodislav.—Triumph of Mystislav.—Return of Volodislav.—Rule of
Volodislav in Galitch.—Andrei of Hungary and his queen.—History of
Benedict Bor.—Volynia rises against Volodislav.—Defeat of Volodislav.
—The young King and Queen of Galitch.—Volodislav dies in prison.—
Latin priesthood brought into Galitch, 1214.—Dispute between
Novgorod and Big Nest.—Mystislav the Gallant, son of Mystislav the
Brave.—Appearance of Mystislav in Novgorod.—Success of Mystislav
the Gallant.—Trouble between Big Nest and his son.—Death of Big
Nest, 1212.—Mystislav the Gallant assists Kief.—Flight of Chermny.—
Death of Chermny, father of Michael the Martyr 161

CHAPTER VIII

Triumph of Mystislav the Gallant.—Superiority of Mystislav over


Russian princes.—Marriage of Daniel, Roman’s son.—Success of
Daniel.—Perilous position of Daniel.—Endurance of Daniel.—Yaroslav
Prince of Novgorod.—Misfortunes of Novgorod.—Appearance of
Mystislav the Gallant in Novgorod.—War between Novgorod and
Vladimir.—Reinstatement of Constantine by Mystislav, 1215.—Battle
of Lipetsk.—Departure of Yuri.—Death of Vassili, son of Mystislav the
Gallant.—Installation of Latin priests in Galitch.—Decision of Russian
princes to regain Galitch.—Battles fought by Daniel.—Reign of
Koloman and Silomeya in Galitch.—Management of Sudislav “the
traitor.”—Hurried preparations to defend Galitch.—Seizure of towns
and cities by Leshko of Poland.—Defeat of the Poles.—Storming of
Galitch by Mystislav.—Conspiracies in Galitch and Volynia.—Success
of Daniel, son of Roman.—Troubles in Novgorod, way to the sea cut
off by Fins.—Troubles among Lithuanian tribes 185 [xiv]

CHAPTER IX

The Baltic coast.—Kors and Livs.—Merchants of the 12th century.—


Visit of Meinhardt to Polotsk, 1186–7.—Attack of Kors and Livs on the
Germans.—Founding of Holm or Kirchholm.—Conversion of pagan
tribes.—Death of Meinhardt, 1196.—Victory of the Germans.—
Reëstablishment of the Livonian Church.—Decision of Rome.—Albert
von Apeldern Bukshevden.—Building of a fortress.—Founding of the
city of Riga.—Dispute between Albert, Bishop of Livonia, and the
Order.—Seizure of Polotsk territory.—Embassy sent by the bishop to
Vladimir.—Preparations of Riga for defense.—Embassy from Riga.—
Message sent by the abbot to the envoys of the prince.—Attack on
Holm by Ako.—Defeat of Ako.—Campaign of Vladimir against Riga.—
Negotiations between the bishop and Vladimir.—Dissatisfaction of the
people subject to Riga.—Crossing of the Dvina.—Complaints of the
bishop against Pskoff and Novgorod.—Refusal of Pskoff and
Novgorod to make a treaty with Riga.—Meeting of the archbishop
and Vladimir.—Prince of Polotsk.—Return of Mystislav the Gallant to
Novgorod, 1214.—Defeat of the knights of Riga.—Cruelties of the
knights.—Fate of Kors and Livs.—Trouble in Lithuania from Prussian
refugees.—Esthonia.—Expedition of Yaroslav against Riga.—Prince
Vyachko of Kuikenos.—Siege of Yurieff.—Burning of Yurieff by its
defenders.—Capture of Yurieff.—Quarrels between Pskoff and
Novgorod.—Occupation of Pereyaslavl.—Radical changes in Russia.—
Battle on the Kalka, 1224.—Defeat of the Russians.—Accusations
against Daniel.—Death of Mystislav, 1228 206

CHAPTER X

Vladimir, son of Rurik, prince in Kief.—Trouble over the Kief


principality.—Michael of Chernigoff.—War throughout Galitch and
Volynia, from 1230 to 1240.—Escape of Daniel.—Defeat of Michael.—
Constant dissensions in Russia.—Intriguing of Galitch boyars.—Plot
against Daniel.—Riots in Galitch.—Capture of Peremysl.—Shifting
fortune of Daniel.—Schemes of Bailski.—Yaroslav, son of Big Nest,
Prince of Kief, 1237.—Capture of Kief by Michael of Chernigoff.—
Desertion of Kief in 1239.—Ruin of Pereyaslavl by the Mongols.—
Triumph of Daniel.—Mongol tempest.—Attack on Trans-Volga regions
by Mongols.—Batu, grandson of Jinghis Khan.—Advance on Ryazan
by Mongols.—Terror in Russia.—Resistance of Ryazan.—Capture of
Ryazan, and slaughter of the population.—Fury of Kolovrat.—Attack
on Vladimir.—Burning of Kolomna.—Burning of Moscow.—Capture of
Vladimir, 1238.—Slaughter and destruction.—Struggle on the Siti.—
Victory of the Mongols.—Burning of Torjok, Tver and Yaroslavl.—
Advance upon Kief, 1240.—Flight of Michael from the capital.—
Campaign of Batu against Kief.—Defense of Kief.—Capture of Kief,
and slaughter of the inhabitants.—Capture of Ladyjin.—Assault on
Volynia.—Destruction of Brest.—Mongols in Poland, 1240.—March on
Galitch.—Flight of Boleslav of Cracow, 1241.—March of the Mongols
on Breslau.—Advance to frontiers of Bohemia and Austria.—Demand
of Batu that King Bela yield obedience.—March of Hungarian army to
meet the Mongols.—Death of Ogotai.—Terror brought on Europe by
Batu.—Mongol law.—Mongol ceremonies.—Cruelty of Batu.—
Questions regarding the Latin religion.—Daniel crowned, 1253.—
Daniel summoned to the Horde.—Reception of Daniel by the Horde.
—Promises of the papal legate 225 [xv]

CHAPTER XI

Despair of Michael of Chernigoff, 1245.—Youth of Michael.—Return of


Michael to the ruins of Chernigoff.—Preparations to visit the Horde.—
Arrival at Sarai.—Refusal of Michael to comply with Mongol demands.
—Decision of Michael.—Execution of Michael 254

CHAPTER XII

Yaroslav prince in Vladimir.—Return of Yaroslav to Vladimir.—Survival


of Novgorod.—Victory of Alexander on the Neva, 1240.—Indecision
of Novgorod.—Attack of towns on the Klyazma.—Return of
Constantine from Mongolia, 1245.—Misfortune of Yaroslav.—Journey
through Central Asia.—The Mongol capital.—Death of Yaroslav.—
Burial of Yaroslav.—The Mongol yoke.—Alexander Nevski.—Marriage
of Alexander.—Campaign against the Chuds and Lithuanians.—
Success of Nevski.—Insolence of the Livonian knights.—Swedish
ships in the Neva.—Closing of the way to the Baltic.—Trouble
between Novgorod and Vladimir.—Capture of Izborsk, Yurieff and
Pskoff by the Livonian knights.—Arrival of Nevski by Pskoff.—Fame of
Nevski.—Raids of the Lithuanians.—Flight of the Grand Master of the
Livonian Order.—Reception of Nevski by Pskoff.—Fame of Nevski.—
Raids of the Lithuanians.—Visit of Nevski to the Horde.—Return of
Nevski to Novgorod.—Rejection of old rules.—Confusion and disorder
in all parts of Russia.—Questions regarding succession of princes
under Mongol rule.—Embassy from Rome to convert Nevski.—Plano
Karpini.—Letter of the Pope to Nevski.—Rule of Sartak, son of Batu.
—Death of Batu.—Difficulties attending a visit to the Horde.—Dispute
between Sviatoslav and his nephew, Andrei.—Visit of Andrei to the
Horde.—Inability of Nevski to act against the Mongols.—Death of
Sviatoslav.—Visit of Alexander to the Horde.—Punishment given
Vladimir by the Mongols.—Flight of Andrei and Yaroslav.—Victory of
the Mongols.—Escape of Andrei to Riga.—Return of Nevski to
Vladimir.—Rules of Nevski in Vladimir, 1252.—Murder of Sartak.—
Seizure of the Mongol throne by Berkai.—Visit of the Russian princes
to Sarai 260

CHAPTER XIII

“Lord Novgorod.”—Novgorod “liberties.”—Insolence and unrest of


Novgorod.—Disgrace of Yaroslav.—Excitement in Novgorod.—Riot in
Novgorod.—Persistence of Nevski.—Nevski’s message to the city of
Novgorod.—Attack of Germans on Novgorod borders.—Attack of the
Swedes.—Campaign of Nevski against Fins and Lapps.—
Establishment of the Finnish boundary.—Demands of the Mongols.—
Taking of the census.—Appearance in Ryazan of officials from the
Horde.—Opposition to the census.—Trouble in Novgorod over the
census.—Murder of Mihalko.—March of Nevski to Novgorod.—
Message of Nevski to Pskoff.—Threats of the Mongols.—Rescue of
Novgorod by Nevski.—Taking of the census in Vladimir.—Birth of
Nevski’s youngest son, Daniel, 1261.—Uprisings against tax
collectors.—Advance of the Knights of Livonia on Pskoff.—Visit of
Nevski to the Horde.—Dissatisfaction at the Horde.—Death of Nevski,
1263.—Inheritance of Daniel of Moscow.—Increase in the importance
of Moscow.—Founding of Moscow.—Government of Vladimir
principality.—Life of Daniel.—Population and growth of Moscow.—
Death of Andrei, Nevski’s brother, 1304.—Struggle between Yuri and
Michael of Tver, 1308.—Struggle of Yuri [xvi]and Michael to incline
Novgorod to their side.—Maxim the metropolitan.—Visit of Yuri to the
Horde.—Visit of Michael of Tver to the Horde.—Defeat of Akinfi, a
Moscow boyar.—Return of Michael from the Horde.—Campaign
against Moscow.—Complaints at the Horde of Michael against Yuri.—
Failure of Michael of Tver to take Moscow.—Death of Tokhta, the
Khan, 1312.—Succession of Uzbek.—Visit of Russian princes to Sarai.
—Conversion of Uzbek to Islam.—Journey of Yuri to the Horde.—
Kavgady, a Mongol magnate.—Marriage of Yuri to Konchaka, sister of
the Khan.—Expulsion of Michael’s officials from Novgorod.—An
unfortunate expedition.—News of the approach of Yuri with a large
army.—Increase of defenses in Tver.—Indecision of Michael’s allies.—
Collection of tribute.—Accuracy of Michael in regard to tribute.—
Burning of towns by Yuri’s army.—Meeting of forces, December 22,
1317.—Defeat of Yuri.—Capture of Konchaka, Yuri’s wife.—Delight of
the victors.—Attempt of Yuri to cross the Volga with a new army.—
Death of Konchaka, and trouble for Michael.—Visit of Michael to
Sarai.—Arrival of Michael at Sarai.—Trial of Michael.—Judgment of
the princes of the Horde.—Sentence of Michael.—New trial by order
of the Khan, and a new sentence.—Kang put on Michael.—Mongol
hunting party.—Journey of twenty-five days’ duration.—Execution of
Michael 279

CHAPTER XIV

Return of Yuri with Khan’s patent.—Death of Boris, Yuri’s brother.—


Gift of land by Yuri to his brother Ivan.—Visit of Ivan of Moscow to
the Horde, 1320.—Marriage of princes.—Quarrel of Yuri with Ryazan.
—Subjection of minor princes.—Visit of Dmitri of Tver to the Horde.—
Explanation given Uzbek by Dmitri regarding Yuri’s calumniation of
his father.—Yuri summoned to Sarai.—Defeat of the Swedes by Yuri.
—Hesitation of Yuri to visit the Horde.—Visit of Dmitri to the Horde.—
Murder of Yuri by Dmitri.—Execution of Dmitri, 1326.—Cholkhan sent
to Tver by Uzbek, 1327.—Riot in Tver; killing of Mongols.—Anger of
Uzbek.—Bloodshed throughout all Vladimir, 1328.—Flight of
Alexander to Novgorod.—March of the Khan toward Moscow.—
Embassy sent to Uzbek.—Terror throughout Russia.—Reception of
Ivan by Uzbek.—Return of Ivan, 1332.—Demand of the Khan that
Alexander should be sent to him.—Search for Alexander.—Refusal of
Alexander to visit the Horde.—Return of Alexander to Pskoff.—
Moscow the real capital of Russia.—Rule of Ivan.—Position of Ivan.—
Seizure of Torjok by Ivan to force obedience of Novgorod.—Quarrels
of Novgorod with Ivan.—Friendship of Novgorod and Lithuania.—
Rule of Gedimin’s son in Novgorod.—Ivan Grand Prince of all Russia.
—Friendship of Uzbek.—Growth Of Moscow.—Visit of Alexander to
Sarai.—Astonishment of Uzbek.—Return of Alexander to Russia.—
Quarrels with Moscow.—Disorder in Novgorod.—Alexander
summoned to Sarai.—Trial of Alexander.—Execution of Alexander and
his son.—Death of Ivan Kalitá, 1340.—Death of Gedimin and Uzbek,
1340.—Account of Gedimin’s dynasty.—Account of Mindog’s activity.
—Reign of Trenyat in Lithuania.—Securing of power by Voishelk.—
Viten, Dovmont and Gedimin.—Message from Bishop of Riga to the
Pope, 1323.—Arrival of envoys to baptize and crown Gedimin.—
Refusal of Gedimin.—Liberty declared to the Orthodox Church.—
Beginning of war by the Livonian Knights.—Death of Gedimin.—
Cremation of Gedimin at Vilna.—“Pagan hunts” of the knights, 1336.
—Rule of Olgerd.—Description of Olgerd 308 [xvii]

CHAPTER XV

Increase of Lithuania, 1340.—Simeon successor of Ivan of Moscow.—


Complaint of Simeon against Novgorod.—Outbreak in Torjok.—March
of Simeon to Torjok.—Reign of Simeon.—Trouble in Riga territory.—
Pskoff regions plundered by Olgerd.—Attack planned by Olgerd
against Simeon.—Envoys sent to Chanibek by Simeon.—Seizure of
Lithuanian envoys by Chanibek.—Victory of the Germans over
Olgerd.—Olgerd’s desire for peace.—Marriage of Simeon.—Baptism
of Olgerd.—Marriage of Olgerd and Julianna.—Peace in Tver.—
Quarrels in Ryazan.—Attack of Simeon against Olgerd.—Death of
Simeon by plague, 1353.—Death of Feognost, 1356.—Succession of
Ivan, son of Ivan Kalitá.—Alexis successor of Feognost.—Struggle of
Constantine of Suzdal to obtain the Grand Principality.—Trouble in
Ryazan.—Ivan’s lieutenant imprisoned.—Mamat Hodja sent by the
Horde to settle boundaries between Ryazan and Moscow.—
Assassination of Mamat.—Intention of Olgerd to master all Russia.—
Claims of Olgerd.—Influence of Olgerd in Tver.—Preference of
Novgorod for Roman, Olgerd’s metropolitan.—Tradition concerning
the days of Ivan.—Death of Chanibek, 1358.—Accession of Berdibek.
—Death of Ivan the Mild, 1359.—Death of Berdibek, successor of
Chanibek.—Successor of Kulpa followed by Navrus.—Appearance of
Mamai, and division of the Horde.—Disturbance in Russia.—Abdul
Khan on the right bank of the Volga, Murat on the east.—Great
enmity of the two Hordes.—Dmitri of Moscow Grand Prince of all
Russia.—Position in Moscow when Dmitri began to reign.—Jealousy
of Abdul, the Khan, for Dmitri; trouble arising thereby.—Moscow
takes possession of Bailozero, 1363.—Success of Dmitri.—Nizni
patent obtained by Boris.—Boris summoned to Moscow.—March of
Dmitri against Nizni.—Olgerd the great enemy of Moscow.—Condition
in Tver.—Yeremi sets aside his oath to Tver, 1367.—Visit of Michael to
Ryazan and Moscow.—Dmitri of Moscow.—Detention of Michael.—
Reprimand from Mongol envoys.—Liberation of Michael.—Attack of
Olgerd on Moscow, 1368.—Retreat of Olgerd.—Peace between
Moscow and Tver.—Threats of Olgerd against Dmitri.—Campaign of
Tver and Lithuania against Moscow, 1370 336

CHAPTER XVI

Visit of Michael to the Horde, 1371.—Cost of Mamai’s good-will.—


Desire of Dmitri to make war on the Mongols.—Discouragement in
Moscow.—Decision of Dmitri to visit the Horde.—Reception of Dmitri
at Sarai.—Moscow joined by Novgorod.—War between Moscow and
Tver.—March of Oleg against Moscow.—Battle of Skornistchevo.—
Defeat of Oleg.—Abakumovitch of Torjok.—Suffering of Torjok from
Mongols.—Defeat of Olgerd.—Threats of the Mongols.—War made on
Moscow by Mamai.—Waiting for the Mongols, 1373.—Devotion of the
people.—Appointment of Michael as Grand Prince.—Michael breaks
his oath to Moscow.—March of Dmitri against Tver.—Defeat of Tver.—
Peace with severe terms.—End of war between Tver and Moscow,
1375.—Death of Olgerd, 1377.—Murder of Keistut by his nephew
Yagello.—Attack of Mongols on Nizni Novgorod.—Killing of Saraiko,
the Mongol envoy, and his suite.—Nizni territories doomed to fire and
sword.—Advance of Dmitri to the Oká.—Appearance beyond the Sura
of Arabshah, a Mongol prince, 1377.—Nizni’s request for aid from
Moscow.—Russian troops surprised and destroyed by Mongols.—
Death of Prince [xviii]Ivan.—Attack on Ryazan by Mongols.—Moscow
men cut down for aiding Mongols.—Anger of Mamai.—Mustering of
Mongol forces, 1378.—Mongols cross the Voja August, 1378.—Victory
of Dmitri.—Execution of Ivan Velyaminoff, the first man put to death
publicly in Moscow, August 30, 1379.—Great work of the
metropolitan Alexis.—Church troubles in Moscow.—Mityai given the
highest church office by Dmitri.—Anger of Cyprian.—Imprisonment of
Cyprian.—Quarrel between Mityai and Dionisi.—Mityai starts for
Tsargrad, 1379.—Death of Mityai.—Deceit of Pimen.—Confirmation of
Pimen as metropolitan.—Refusal of Dmitri to receive Pimen.—
Sending of Dionisi to Tsargrad to secure the expulsion of Pimen.—
Death of Dionisi.—Mamai rouses the Mongols to destroy Russia.—
Mustering of forces by Dmitri, 1379.—Boasting of Mamai.—
Correspondence of Oleg of Tver with Yagello of Poland.—March of
Vagello to join Mamai, 1380.—Distribution of Dmitri’s army.—Address
of Dmitri to his officers.—Examination of the battle ground by Bobrok
and Dmitri.—Description of Kulikovo.—Eagerness for action.—
Beginning of the great battle.—Enormous victory of Russia on the
field of Kulikovo 358

CHAPTER XVII

Fresh troops assembled by Mamai.—Tohtamish declared heir of Batu.


—Slaughter among Mongols.—Demand from Tohtamish that all the
Russian princes should come to Sarai.—Indignation in Russia.—
Confidence of Dmitri in his own strength.—Treachery of Oleg.—
Approach of Tohtamish’s troops.—Disorder in Moscow.—Appearance
of Ostei in the capital.—Retreat of the Mongols.—Rebuilding of
Moscow by Dmitri.—Sending of Vassili to do homage at the Horde.—
Declaration of Tohtamish.—Death of the Nizni prince.—Revenge of
Oleg of Ryazan.—Seizure of Kolomna.—Vladimir the Brave.—Peace
made between Oleg and Dmitri.—Return of Dmitri’s son from the
Horde.—Troubles of Dmitri regarding succession.—Self-sacrifice of
Vladimir the Brave.—Death of Dmitri.—Succession of Vassili.—Visit of
Vassili to the Horde.—Marriage of Vassili.—Tamerlane, the world-
shaking Mongol.—Trouble between Tamerlane and Tohtamish.—
Attack of Tohtamish on regions belonging to Tamerlane, 1392.—Army
of Tohtamish.—Escape of Tohtamish.—Attack of Tamerlane on
Tohtamish.—Fortunate aid of Nur ed din.—Flight of Tohtamish.—
Vassili of Moscow leads an army to the Oká to confront Tamerlane.—
Withdrawal of Tamerlane.—Storming of Astrachan.—Plans of Vitold to
rule the Golden Horde.—Great army assembled to move on the
Mongols.—Battle of August 5, 1399.—Triumph of Kutlui. Defeat of
Vitold.—Trouble in Smolensk.—War between Lithuania and Smolensk.
—Welcome of Yuri in Novgorod.—Attack of Vitold on Pskoff.—
Disorder in the Horde.—Installation of Bulat Bey, Kutlin’s son.—
Edigai’s march on Moscow, 1408.—Capture of Pereyaslavl, Rostoff
and Nizni.—Eligai recalled by Bulat.—Unwillingness of Vassili to pay
tribute to the Mongols.—Installation of Jelal ed din as Khan.—
Assassination of Jelal ed din.—Dispute between the Teutonic Order
and Yagello.—Konrad von Jungingen, 1393–1407.—Battle of
Tannenberg.—Defeat of the Order.—Meeting of Yagello, Vitold and
Russian boyars at Horodlo, 1413.—Predominance of Poles in upper
circles of Russia.—Death of Cyprian, 1406.—Synod assembled by
Vitold, 1416.—Territory of Vitold.—Meeting of sovereigns brought
about by Vitold, at Lutsk, 1429.—Opposition of Olesnitski.—Assembly
at Vilna, 1430.—Disappointment [xix]of Vitold.—Death of Vitold,
1430.—Death of Vassili, 1424.—Visit of Yuri to the Crimea.—War
between Mongol Khans.—Trouble caused by an heirloom.—Vassili
defeated by Yuri, his rival for the throne of Moscow.—Refusal of
Moscow boyars to serve Yuri.—Return of Vassili to power.—The
Vyatka, a Novgorod colony 392

CHAPTER XVIII

Death of Foti, 1431.—Succession of Iona.—Church divisions and


troubles.—Union of Churches.—Mohammed expelled from the Horde
by Kutchuk.—Mongol troops sent against Russia, 1445.—March of
Vassili to meet the enemy.—Defeat of Vassili. Seizure of his person.—
Return of Vassili to Moscow, 1445.—Plot of Ivan against Vassili.—
Capture of Vassili by Ivan.—Blinding of Vassili.—Shemyaká reigns in
Moscow.—Shemyaká frees Vassili.—Defeat of Shemyaká.—Surrender
of Galitch to Vassili, 1450.—Death of Shemyaká, 1453.—Influence of
Vassili over Tver and Ryazan.—Campaign of Vassili against Novgorod.
—Death of Vassili, 1462.—Influence of Poland.—The Poles plan to
seize Podolia and Volynia.—Stratagem of Polish knights.—
Imprisonment of Polish envoys by Svidrigello.—Polish king leads an
army into Volynia, 1431.—Sacking of Vladimir by Poles.—Olesnitski
the chancellor.—Lithuania acknowledges Sigismund.—Crowning of
Sigismund.—Death of Yagello.—Vladislav successor of Yagello.—
Agreement of Sigismund with Kief and Volynia.—Victory of
Sigismund.—Diet summoned by Sigismund.—Murder of Skobeiko.—
Kazimir made prince.—Entrance of Kazimir into Vilna.—Crowning of
Kazimir.—Peace between Michael and Kazimir.—Poles seek to turn
Lithuania and Russia into Polish provinces.—Death of Svidrigello,
1415.—Peace of Thorn, 1466.—Alexander receives Kief regions from
Vassili of Moscow.—Death of Alexander, 1455.—Simeon rules in Kief
till 1471.—Succession of Michael.—Plot to assassinate King Kazimir.—
Execution of Alexander’s son, Michael, 1482.—Separation of the
Orthodox Church into two parts.—Death of Kazimir IV, 1492.—
Khanate of the Crimea.—Origin of the Crimean khanate.—Raids of
Mongols against Russians.—Death of the first Khan of the Crimea.—
Condition of the Crimean khanate.—Change of Russian boundaries.—
Founding of Kremnchug and Cherkasy by Vitold 427

CHAPTER XIX
Birth of Ivan III, January 22, 1440.—Consolidation of Russia.—
Decline of Novgorod.—Martha Boretski, the Novgorod patriot, favors
Kazimir.—Defeat of the Boretski party.—Disputes in Moscow.—
Epistles of the metropolitan Philip.—Fall of Novgorod.—Decision of
Ivan of Moscow.—Prince Shuiski.—Attack on Novgorod by Ivan.—
Siege of Deman by Moscow.—Riots in Novgorod.—Success of
Moscow.—Submission of Novgorod 454

CHAPTER XX

Feofil, Archbishop of Moscow, 1471.—Marriage of Ivan of Moscow to


Sophia.—Journey of Sophia to Russia.—Trouble with the Roman
legate.—Advance of Ivan to Novgorod.—Hospitality of Novgorod
people.—Dispute between the Grand Prince and the Novgorod
people.—Trouble made by the Kazimir party in Novgorod.—
Declaration of war sent to Novgorod by Ivan.—Novgorod begs for
peace.[xx]—Discussions with peace envoys.—Hunger in Novgorod.—
Triumph in Moscow.—Insurrection in Novgorod.—Visit of Ivan to the
city.—Siege of Novgorod.—Distribution of the people of Novgorod.—
End of semi-separate existence of Novgorod.—Importance of Ivan,
even in Europe.—Fear of Ivan causes Kazimir to rouse Ahmed
against Moscow.—Friendship of Girei, Khan of the Crimea, and Ivan
of Moscow.—Ivan withdraws from the capital.—Dissatisfaction of the
people.—Letter of Ivan’s confessor.—Ivan orders his son to Moscow.
—Refusal of the son to comply.—Lack of eagerness for battle.—
Attack of Girei on Volynia and Kief draws Kazimir’s forces southward.
—Command of Ivan for the army to withdraw from the Ugra.—
Retreat of the Mongols.—Destruction of the Horde by Mongols
without bloodshed in Russia.—Last blow given to the Golden Horde
by Girei, Khan of the Crimea.—Destruction of Sarai, and end of the
Mongol yoke in Russia 463 [1]
[Contents]
THE MONGOLS
IN RUSSIA
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

textbookfull.com

You might also like