Wireshark: Packet Analysis and Ethical Hacking: Core Skills

Wireshark: Packet Analysis and Ethical Hacking: Core Skills

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 208 lectures (14h 15m) | 11.1 GB

From basic to advanced network analysis using Wireshark! Ethical Hacking using Kali Linux: Passwords, Security, Protocol

Learn Wireshark practically. Wireshark pcapng files provided so you can practice while you learn! There is so much to learn in this course:

  • Capture Telnet, FTP, TFTP, HTTP passwords.
  • Replay VoIP conversations.
  • Capture routing protocol (OSPF) authentication passwords.
  • Troubleshoot network issues.
  • Free software.
  • Free downloadable pcapng files.
  • Answer quiz questions.

The course is very practical. You can practice while you learn!

Learn how to analyze and interpret network protocols and leverage Wireshark for what it was originally intended: Deep Packet Inspection and network analysis.

I also show you have to hack network protocols using Kali Linux! Hack network protocols like DTP, VTP, STP and DHCP using Ethical hacking tools included in Kali Linux.

Updates: Now includes Python scripting to automatically capture packets from the network using tshark. Lean how to automate your captures and learn how to hack the network using Python and Wireshark.

Protocols we capture and discuss in this course include:

  • Telnet
  • FTP
  • TFTP
  • HTTP
  • VoIP
  • OSPF
  • EIGRP
  • DNS
  • ICMP
  • DTP
  • VTP
  • STP
  • DHCP

What you’ll learn

  • Learn how to troubleshoot networks using Wireshark.
  • Capture VoIP, OSPF, HTTP, Telnet and many other protocols using Wireshark.
  • Learn how to use Wireshark for Ethical hacking.
  • Improve your job prospects by adding Wireshark to your resume.
  • Understand and interpret network protocols.
  • Hack Network Protocols using Kali Linux
Table of Contents

Introduction
1 Introduction
2 Udemy Tips and Tricks
3 Answering your questions
4 Wireshark Installation Windows
5 Wireshark Installation Mac OS

Wireshark Basics
6 The best way to learn!
7 Capture frames packets segments
8 Why are no packets captured
9 Port SPAN Mirroring

OSI Model
10 Make a choice
11 OSI Model – Part 1 – OSI Model Introduction
12 OSI Model – Part 2 – OSI Model Layers
13 OSI Model – Part 3 – Split of concentration
14 OSI Model – Part 4 – Layer 7 Application Layer
15 OSI Model – Part 5 – Layer 6 Presentation Layer
16 OSI Model – Part 6 – Layer 5 Session Layer
17 OSI Model – Part 7 – Top layers versus lower layers
18 OSI Model – Part 8 – Transport Layer
19 OSI Model – Part 9 – Network Layer
20 OSI Model – Part 10 – Data Link Layer
21 OSI Model – Part 11 – Physical Layer
22 OSI Model – Part 12 – Host Communication
23 OSI Model – Part 13 – Encapsulation
24 OSI Model – Part 14 – TCPIP versus OSI Model

Wireshark Filters
25 Wireshark Display filters
26 Practical Demonstration of Wireshark Display filters
27 Two types of filters
28 Wireshark Capture Filters
29 Wireshark Filters IP address protocols

Wireshark Hacking Passwords
30 Telnet Password & Data Captures
31 TFTP Password & Data Capture
32 FTP Password & Data Capture
33 HTTP Data Capture
34 Cisco router HTTP Password Capture

Hacking VoIP
35 Replay Voice over IP calls (Virtual IP Phones)
36 Capture and replay voice calls (Virtual & Physical IP Phones)

Protocol Analysis Can you troubleshoot the network
37 DTP Lab Quiz
38 DTP Lab Answers
39 CDP, LLDP Lab Quiz
40 CDP, LLDP Lab Answers
41 OSPF Lab Quiz
42 OSPF Lab Answers Part 1
43 OSPF Lab Answers Part 2
44 OSPF Troubleshooting Lab 1 Question
45 OSPF Troubleshooting Lab 1 Answers
46 OSPF Troubleshooting Lab 2 Question
47 OSPF Troubleshooting Lab 2 Answers
48 OSPF Troubleshooting Lab 3 Question
49 OSPF Troubleshooting Lab 3 Answers
50 EIGRP Lab Questions
51 EIGRP Lab Answers
52 EIGRP Troubleshooting Lab 1 Question
53 EIGRP Troubleshooting Lab 1 Answers
54 EIGRP Troubleshooting Lab 2 Question
55 EIGRP Troubleshooting Lab 2 Answers
56 BGP Lab Question
57 BGP Lab Answers
58 BGP Troubleshooting Lab Question
59 BGP Troubleshooting Lab Answers

Wireshark Tips and Tricks
60 Quick Wireshark Filters
61 Wireshark Profiles
62 Wireshark Conversation Filters
63 Wireshark Statistics
64 Wireshark Protocol Hierarchy
65 Wireshark Conversations and IO Graph
66 Wireshark Flow Graph

tshark and Termshark
67 Overview and tshark install and packet capture
68 Termshark

Python Wireshark scripting
69 tshark and Pyshark installation
70 Basic Pyshark testing
71 Pyshark script

Python Wireshark Password Captures
72 Lab overview and setup
73 iPython and interactive OSPF script
74 OSPF Password Python script
75 FTP Password Capture Python script
76 Telnet Password Capture Python Script

Kali Linux Installation
77 Import Kali Linux (Windows 10 VirtualBox)

Kali Linux Network Attack Demonstrations
78 Network Overview
79 DTP Attack Demo
80 VTP Attack Demo Part 1
81 VTP Attack Demo Part 2
82 Spanning Tree Attack Demo
83 Demo Mitigation of attacks

Kali Linux DHCP attacks and Man-in-the-middle attack
84 Overview of lab
85 DHCP Starvation attack
86 Rogue DHCP Server; MITM attack, Wireshark password sniffing

Wireshark Quiz Questions
87 Don’t worry!
88 Wireshark Quiz 1
89 Wireshark Quiz 1 Answers
90 Wireshark Quiz 2
91 Wireshark Quiz 2 Answers
92 Wireshark Quiz 3
93 Wireshark Quiz 3 Answers
94 Wireshark Quiz 4
95 Wireshark Quiz 4 Answers
96 Wireshark Quiz 5
97 Wireshark Quiz 5 Answers
98 Wireshark Quiz 6
99 Wireshark Quiz 6 Answers
100 Wireshark Quiz 7
101 Wireshark Quiz 7 Answers
102 Wireshark Quiz 8
103 Wireshark Quiz 8 Answers
104 Wireshark Quiz 9
105 Wireshark Quiz 9 Answers
106 Wireshark Quiz 10
107 Wireshark Quiz 10 Answers
108 Wireshark Quiz 11
109 Wireshark Quiz 11 Answers
110 Wireshark Quiz 12
111 Wireshark Quiz 12 Answers
112 Wireshark Quiz 13
113 Wireshark Quiz 13 Answers
114 Wireshark Quiz 14
115 Wireshark Quiz 14 Answers
116 Wireshark Quiz 15
117 Wireshark Quiz 15 Answers
118 Wireshark Quiz 16
119 Wireshark Quiz 16 Answers
120 Wireshark Quiz 17
121 Wireshark Quiz 17 Answers
122 Wireshark Quiz 18
123 Wireshark Quiz 18 Answers
124 Wireshark Quiz 19
125 Wireshark Quiz 19 Answers
126 Wireshark Quiz 20
127 Wireshark Quiz 20 Answers
128 Wireshark Quiz 21
129 Wireshark Quiz 21 Answers
130 Wireshark Quiz 22
131 Wireshark Quiz 22 Answers
132 Wireshark Quiz 23
133 Wireshark Quiz 23 Answers

VTP Theory and demonstrations
134 Make a choice
135 VTP Overview
136 VTP Overview Part 2
137 VTP Modes
138 VTP Versions
139 VTP on real 3750 switch
140 VTP – Demo Erase switch config
141 VTP Pruning
142 VTP Defaults
143 VTP Warnings!
144 VTP Demo Overview & Switch 1 config
145 VTP Demo Autonegotiation S2
146 VTP Demo VTP Client
147 VTP Demo Client overrides server
148 VTP Network Meltdown! VLANs removed from database!
149 VTP Demo Network Back Again and Transparent Mode
150 VTP Physical swtiches auto learn VTP domain

Spanning Tree theory and demonstrations
151 Spanning Tree Overview
152 Versions of Spanning Tree
153 Why is Spanning Tree Required
154 BPDUs and Bridge IDs
155 Demo STP Root
156 Root Ports and Designated Ports
157 Extended Bridge ID
158 PortFast
159 Path Cost Part 1
160 Path Cost Part 2
161 Path Cost Part 3
162 PVST versus RPVST Port States
163 RPVST and PVST Interoperability and 802.1w and 802.1s Overview
164 w and 802.1s Overview
165 w
166 Demo 802.1w
167 w Link Types
168 w Proposals
169 s MSTP
170 Spanning Tree Comparison Summary

Port SPAN (Mirroring) theory and demonstrations
171 SPAN Introduction
172 SPAN network overview
173 Tests before SPAN
174 Configure SPAN
175 SPAN Ingress Options
176 SPAN Options
177 SPAN – Multiple Sessions

BGP theory and demonstrations
178 BGP and the CCNA
179 BGP Overview
180 BGP Looking Glass
181 GNS3 BGP Part 1
182 GNS3 BGP Part 2
183 GNS3 BGP Part 3
184 GNS3 BGP Part 4
185 GNS3 BGP Part 5
186 GNS3 BGP Part 6
187 GNS3 BGP Part 7
188 GNS3 BGP Part 8
189 GNS3 BGP Part 9
190 GNS3 BGP Part 10

Dynamic Trunk Protocol – DTP
191 DTP Theory
192 DTP GNS3 Demo Part 1
193 DTP GNS3 Demo Part 2
194 DTP GNS3 Demo Part 3
195 CCNA Dynamic Trunking Protocol (DTP) Quiz Can you answer the ccna quiz question

CDP Overview
196 CDP Introduction
197 CDP Demo

GNS3 Campus 1 CDP and LLDP
198 CDP Demo Basic discovery
199 CDP Demo Disable globally and per interface
200 CDP Demo Command Options
201 LLDP Demo Discover Linux Servers

Port Security
202 Port Security Overview
203 Port Security and security mechanisms
204 MAC addresses Port Security Static, Dynamic, Sticky
205 Port Security Demo Part 1
206 Port Security Demo Part 2
207 Port Security Demo Sticky
208 Port Security Error disable and auto recovery

Homepage