Wireshark Packet Analysis and Ethical Hacking Core Skills

From basic to advanced network analysis using Wireshark! Ethical Hacking using Kali Linux: Passwords, Security, Protocol
Wireshark Packet Analysis and Ethical Hacking Core Skills
File Size :
16.42 GB
Total length :
14h 15m

Category

Instructor

David Bombal

Language

Last update

1/2023

Ratings

4.6/5

Wireshark Packet Analysis and Ethical Hacking Core Skills

What you’ll learn

Learn how to troubleshoot networks using Wireshark.
Capture VoIP, OSPF, HTTP, Telnet and many other protocols using Wireshark.
Learn how to use Wireshark for Ethical hacking.
Improve your job prospects by adding Wireshark to your resume.
Understand and interpret network protocols.
Hack Network Protocols using Kali Linux

Wireshark Packet Analysis and Ethical Hacking Core Skills

Requirements

Computer capable of running Wireshark.
Internet connection so you can work online.

Description

Learn Wireshark practically. Wireshark pcapng files provided so you can practice while you learn! There is so much to learn in this course:- Capture Telnet, FTP, TFTP, HTTP passwords. – Replay VoIP conversations. – Capture routing protocol (OSPF) authentication passwords.- Troubleshoot network issues.- Free software.- Free downloadable pcapng files.- Answer quiz questions.The course is very practical. You can practice while you learn!Learn how to analyze and interpret network protocols and leverage Wireshark for what it was originally intended: Deep Packet Inspection and network analysis. I also show you have to hack network protocols using Kali Linux! Hack network protocols like DTP, VTP, STP and DHCP using Ethical hacking tools included in Kali Linux.Updates: Now includes Python scripting to automatically capture packets from the network using tshark. Lean how to automate your captures and learn how to hack the network using Python and Wireshark.Protocols we capture and discuss in this course include:- Telnet- FTP- TFTP- HTTP- VoIP- OSPF- EIGRP- DNS- ICMP- DTP-  VTP- STP- DHCP

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 Answering your questions

Lecture 3 Udemy Tips and Tricks

Lecture 4 Wireshark Installation: Windows

Lecture 5 Wireshark Installation: Mac OS

Section 2: Wireshark Basics

Lecture 6 The best way to learn!

Lecture 7 Capture frames / packets / segments

Lecture 8 Why are no packets captured?

Lecture 9 Port SPAN / Mirroring

Section 3: OSI Model

Lecture 10 Make a choice

Lecture 11 OSI Model – Part 1 – OSI Model Introduction

Lecture 12 OSI Model – Part 2 – OSI Model Layers

Lecture 13 OSI Model – Part 3 – Split of concentration

Lecture 14 OSI Model – Part 4 – Layer 7 Application Layer

Lecture 15 OSI Model – Part 5 – Layer 6 Presentation Layer

Lecture 16 OSI Model – Part 6 – Layer 5 Session Layer

Lecture 17 OSI Model – Part 7 – Top layers versus lower layers

Lecture 18 OSI Model – Part 8 – Transport Layer

Lecture 19 OSI Model – Part 9 – Network Layer

Lecture 20 OSI Model – Part 10 – Data Link Layer

Lecture 21 OSI Model – Part 11 – Physical Layer

Lecture 22 OSI Model – Part 12 – Host Communication

Lecture 23 OSI Model – Part 13 – Encapsulation

Lecture 24 OSI Model – Part 14 – TCPIP versus OSI Model

Section 4: Wireshark Filters

Lecture 25 Wireshark Display filters

Lecture 26 Practical Demonstration of Wireshark Display filters

Lecture 27 Two types of filters

Lecture 28 Wireshark Capture Filters

Lecture 29 Wireshark Filters: IP address / protocols

Section 5: Wireshark: Hacking Passwords

Lecture 30 Telnet Password & Data Captures

Lecture 31 TFTP Password & Data Capture

Lecture 32 FTP Password & Data Capture

Lecture 33 HTTP Data Capture

Lecture 34 Cisco router HTTP Password Capture

Section 6: Hacking VoIP

Lecture 35 Replay Voice over IP calls (Virtual IP Phones)

Lecture 36 Capture and replay voice calls (Virtual & Physical IP Phones)

Section 7: Protocol Analysis: Can you troubleshoot the network?

Lecture 37 DTP Lab: Quiz

Lecture 38 DTP Lab: Answers

Lecture 39 CDP, LLDP Lab: Quiz

Lecture 40 CDP, LLDP Lab: Answers

Lecture 41 OSPF Lab: Quiz

Lecture 42 OSPF Lab: Answers Part 1

Lecture 43 OSPF Lab: Answers Part 2

Lecture 44 OSPF Troubleshooting Lab 1: Question

Lecture 45 OSPF Troubleshooting Lab 1: Answers

Lecture 46 OSPF Troubleshooting Lab 2: Question

Lecture 47 OSPF Troubleshooting Lab 2: Answers

Lecture 48 OSPF Troubleshooting Lab 3: Question

Lecture 49 OSPF Troubleshooting Lab 3: Answers

Lecture 50 EIGRP Lab: Questions

Lecture 51 EIGRP Lab: Answers

Lecture 52 EIGRP Troubleshooting Lab 1: Question

Lecture 53 EIGRP Troubleshooting Lab 1: Answers

Lecture 54 EIGRP Troubleshooting Lab 2: Question

Lecture 55 EIGRP Troubleshooting Lab 2: Answers

Lecture 56 BGP Lab: Question

Lecture 57 BGP Lab: Answers

Lecture 58 BGP Troubleshooting Lab: Question

Lecture 59 BGP Troubleshooting Lab: Answers

Section 8: Wireshark Tips and Tricks

Lecture 60 Quick Wireshark Filters

Lecture 61 Wireshark Profiles

Lecture 62 Wireshark Conversation Filters

Lecture 63 Wireshark Statistics

Lecture 64 Wireshark Protocol Hierarchy

Lecture 65 Wireshark Conversations and IO Graph

Lecture 66 Wireshark Flow Graph

Section 9: tshark and Termshark

Lecture 67 Overview and tshark install and packet capture

Lecture 68 Termshark

Section 10: Python Wireshark scripting

Lecture 69 tshark and Pyshark installation

Lecture 70 Basic Pyshark testing

Lecture 71 Pyshark script

Section 11: Python Wireshark Password Captures

Lecture 72 Lab overview and setup

Lecture 73 iPython and interactive OSPF script

Lecture 74 OSPF Password Python script

Lecture 75 FTP Password Capture Python script

Lecture 76 Telnet Password Capture Python Script

Section 12: Kali Linux: Installation

Lecture 77 Import Kali Linux (Windows 10 / VirtualBox)

Section 13: Kali Linux: Network Attack Demonstrations

Lecture 78 Network Overview

Lecture 79 DTP Attack Demo

Lecture 80 VTP Attack Demo Part 1

Lecture 81 VTP Attack Demo Part 2

Lecture 82 Spanning Tree Attack Demo

Lecture 83 Demo: Mitigation of attacks

Section 14: Kali Linux: DHCP attacks and Man-in-the-middle attack

Lecture 84 Overview of lab

Lecture 85 DHCP Starvation attack

Lecture 86 Rogue DHCP Server; MITM attack, Wireshark password sniffing

Section 15: Wireshark Quiz Questions

Lecture 87 Don’t worry!

Lecture 88 Wireshark Quiz 1

Lecture 89 Wireshark Quiz 1 Answers

Lecture 90 Wireshark Quiz 2

Lecture 91 Wireshark Quiz 2 Answers

Lecture 92 Wireshark Quiz 3

Lecture 93 Wireshark Quiz 3 Answers

Lecture 94 Wireshark Quiz 4

Lecture 95 Wireshark Quiz 4 Answers

Lecture 96 Wireshark Quiz 5

Lecture 97 Wireshark Quiz 5 Answers

Lecture 98 Wireshark Quiz 6

Lecture 99 Wireshark Quiz 6 Answers

Lecture 100 Wireshark Quiz 7

Lecture 101 Wireshark Quiz 7 Answers

Lecture 102 Wireshark Quiz 8

Lecture 103 Wireshark Quiz 8 Answers

Lecture 104 Wireshark Quiz 9

Lecture 105 Wireshark Quiz 9 Answers

Lecture 106 Wireshark Quiz 10

Lecture 107 Wireshark Quiz 10 Answers

Lecture 108 Wireshark Quiz 11

Lecture 109 Wireshark Quiz 11 Answers

Lecture 110 Wireshark Quiz 12

Lecture 111 Wireshark Quiz 12 Answers

Lecture 112 Wireshark Quiz 13

Lecture 113 Wireshark Quiz 13 Answers

Lecture 114 Wireshark Quiz 14

Lecture 115 Wireshark Quiz 14 Answers

Lecture 116 Wireshark Quiz 15

Lecture 117 Wireshark Quiz 15 Answers

Lecture 118 Wireshark Quiz 16

Lecture 119 Wireshark Quiz 16 Answers

Lecture 120 Wireshark Quiz 17

Lecture 121 Wireshark Quiz 17 Answers

Lecture 122 Wireshark Quiz 18

Lecture 123 Wireshark Quiz 18 Answers

Lecture 124 Wireshark Quiz 19

Lecture 125 Wireshark Quiz 19 Answers

Lecture 126 Wireshark Quiz 20

Lecture 127 Wireshark Quiz 20 Answers

Lecture 128 Wireshark Quiz 21

Lecture 129 Wireshark Quiz 21 Answers

Lecture 130 Wireshark Quiz 22

Lecture 131 Wireshark Quiz 22 Answers

Lecture 132 Wireshark Quiz 23

Lecture 133 Wireshark Quiz 23 Answers

Section 16: VTP Theory and demonstrations

Lecture 134 Make a choice

Lecture 135 VTP Overview

Lecture 136 VTP Overview Part 2

Lecture 137 VTP Modes

Lecture 138 VTP Versions

Lecture 139 VTP on real 3750 switch

Lecture 140 VTP – Demo: Erase switch config

Lecture 141 VTP Pruning

Lecture 142 VTP Defaults

Lecture 143 VTP Warnings!

Lecture 144 VTP Demo: Overview & Switch 1 config

Lecture 145 VTP Demo: Autonegotiation S2

Lecture 146 VTP Demo: VTP Client

Lecture 147 VTP Demo: Client overrides server

Lecture 148 VTP Network Meltdown! VLANs removed from database!

Lecture 149 VTP Demo: Network Back Again and Transparent Mode

Lecture 150 VTP: Physical swtiches auto learn VTP domain

Section 17: Spanning Tree theory and demonstrations

Lecture 151 Spanning Tree Overview

Lecture 152 Versions of Spanning Tree

Lecture 153 Why is Spanning Tree Required?

Lecture 154 BPDUs and Bridge IDs

Lecture 155 Demo: STP Root

Lecture 156 Root Ports and Designated Ports

Lecture 157 Extended Bridge ID

Lecture 158 PortFast

Lecture 159 Path Cost Part 1

Lecture 160 Path Cost Part 2

Lecture 161 Path Cost Part 3

Lecture 162 PVST versus RPVST Port States

Lecture 163 RPVST and PVST Interoperability and 802.1w and 802.1s Overview

Lecture 164 802.1w and 802.1s Overview

Lecture 165 802.1w

Lecture 166 Demo: 802.1w

Lecture 167 802.1w Link Types

Lecture 168 802.1w Proposals

Lecture 169 802.1s / MSTP

Lecture 170 Spanning Tree Comparison Summary

Section 18: Port SPAN (Mirroring) theory and demonstrations

Lecture 171 SPAN Introduction

Lecture 172 SPAN network overview

Lecture 173 Tests before SPAN

Lecture 174 Configure SPAN

Lecture 175 SPAN Ingress Options

Lecture 176 SPAN Options

Lecture 177 SPAN – Multiple Sessions

Section 19: BGP theory and demonstrations

Lecture 178 BGP and the CCNA

Lecture 179 BGP Overview

Lecture 180 BGP Looking Glass

Lecture 181 GNS3 BGP Part 1

Lecture 182 GNS3 BGP Part 2

Lecture 183 GNS3 BGP Part 3

Lecture 184 GNS3 BGP Part 4

Lecture 185 GNS3 BGP Part 5

Lecture 186 GNS3 BGP Part 6

Lecture 187 GNS3 BGP Part 7

Lecture 188 GNS3 BGP Part 8

Lecture 189 GNS3 BGP Part 9

Lecture 190 GNS3 BGP Part 10

Section 20: Dynamic Trunk Protocol – DTP

Lecture 191 DTP Theory

Lecture 192 DTP GNS3 Demo Part 1

Lecture 193 DTP GNS3 Demo Part 2

Lecture 194 DTP GNS3 Demo Part 3

Lecture 195 CCNA Dynamic Trunking Protocol (DTP) Quiz: Can you answer the ccna quiz question

Section 21: CDP Overview

Lecture 196 CDP Introduction

Lecture 197 CDP Demo

Section 22: GNS3 Campus 1: CDP and LLDP

Lecture 198 CDP Demo: Basic discovery

Lecture 199 CDP Demo: Disable globally and per interface

Lecture 200 CDP Demo: Command Options

Lecture 201 LLDP Demo: Discover Linux Servers

Section 23: Port Security

Lecture 202 Port Security Overview

Lecture 203 Port Security and security mechanisms

Lecture 204 MAC addresses Port Security: Static, Dynamic, Sticky

Lecture 205 Port Security Demo Part 1

Lecture 206 Port Security Demo Part 2

Lecture 207 Port Security Demo: Sticky

Lecture 208 Port Security Error disable and auto recovery

Network Engineers,Network Architects,Ethical hackers,Networking Students

Course Information:

Udemy | English | 14h 15m | 16.42 GB
Created by: David Bombal

You Can See More Courses in the IT & Software >> Greetings from CourseDown.com

New Courses

Scroll to Top