Wireshark Packet Analysis and Ethical Hacking Core Skills
What you’ll learn
Learn how to troubleshoot networks using Wireshark.
Capture VoIP, OSPF, HTTP, Telnet and many other protocols using Wireshark.
Learn how to use Wireshark for Ethical hacking.
Improve your job prospects by adding Wireshark to your resume.
Understand and interpret network protocols.
Hack Network Protocols using Kali Linux
Requirements
Computer capable of running Wireshark.
Internet connection so you can work online.
Description
Learn Wireshark practically. Wireshark pcapng files provided so you can practice while you learn! There is so much to learn in this course:- Capture Telnet, FTP, TFTP, HTTP passwords. – Replay VoIP conversations. – Capture routing protocol (OSPF) authentication passwords.- Troubleshoot network issues.- Free software.- Free downloadable pcapng files.- Answer quiz questions.The course is very practical. You can practice while you learn!Learn how to analyze and interpret network protocols and leverage Wireshark for what it was originally intended: Deep Packet Inspection and network analysis. I also show you have to hack network protocols using Kali Linux! Hack network protocols like DTP, VTP, STP and DHCP using Ethical hacking tools included in Kali Linux.Updates: Now includes Python scripting to automatically capture packets from the network using tshark. Lean how to automate your captures and learn how to hack the network using Python and Wireshark.Protocols we capture and discuss in this course include:- Telnet- FTP-Â TFTP-Â HTTP- VoIP- OSPF- EIGRP- DNS- ICMP- DTP-Â VTP-Â STP- DHCP
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 Answering your questions
Lecture 3 Udemy Tips and Tricks
Lecture 4 Wireshark Installation: Windows
Lecture 5 Wireshark Installation: Mac OS
Section 2: Wireshark Basics
Lecture 6 The best way to learn!
Lecture 7 Capture frames / packets / segments
Lecture 8 Why are no packets captured?
Lecture 9 Port SPAN / Mirroring
Section 3: OSI Model
Lecture 10 Make a choice
Lecture 11 OSI Model – Part 1 – OSI Model Introduction
Lecture 12 OSI Model – Part 2 – OSI Model Layers
Lecture 13 OSI Model – Part 3 – Split of concentration
Lecture 14 OSI Model – Part 4 – Layer 7 Application Layer
Lecture 15 OSI Model – Part 5 – Layer 6 Presentation Layer
Lecture 16 OSI Model – Part 6 – Layer 5 Session Layer
Lecture 17 OSI Model – Part 7 – Top layers versus lower layers
Lecture 18 OSI Model – Part 8 – Transport Layer
Lecture 19 OSI Model – Part 9 – Network Layer
Lecture 20 OSI Model – Part 10 – Data Link Layer
Lecture 21 OSI Model – Part 11 – Physical Layer
Lecture 22 OSI Model – Part 12 – Host Communication
Lecture 23 OSI Model – Part 13 – Encapsulation
Lecture 24 OSI Model – Part 14 – TCPIP versus OSI Model
Section 4: Wireshark Filters
Lecture 25 Wireshark Display filters
Lecture 26 Practical Demonstration of Wireshark Display filters
Lecture 27 Two types of filters
Lecture 28 Wireshark Capture Filters
Lecture 29 Wireshark Filters: IP address / protocols
Section 5: Wireshark: Hacking Passwords
Lecture 30 Telnet Password & Data Captures
Lecture 31 TFTP Password & Data Capture
Lecture 32 FTP Password & Data Capture
Lecture 33 HTTP Data Capture
Lecture 34 Cisco router HTTP Password Capture
Section 6: Hacking VoIP
Lecture 35 Replay Voice over IP calls (Virtual IP Phones)
Lecture 36 Capture and replay voice calls (Virtual & Physical IP Phones)
Section 7: Protocol Analysis: Can you troubleshoot the network?
Lecture 37 DTP Lab: Quiz
Lecture 38 DTP Lab: Answers
Lecture 39 CDP, LLDP Lab: Quiz
Lecture 40 CDP, LLDP Lab: Answers
Lecture 41 OSPF Lab: Quiz
Lecture 42 OSPF Lab: Answers Part 1
Lecture 43 OSPF Lab: Answers Part 2
Lecture 44 OSPF Troubleshooting Lab 1: Question
Lecture 45 OSPF Troubleshooting Lab 1: Answers
Lecture 46 OSPF Troubleshooting Lab 2: Question
Lecture 47 OSPF Troubleshooting Lab 2: Answers
Lecture 48 OSPF Troubleshooting Lab 3: Question
Lecture 49 OSPF Troubleshooting Lab 3: Answers
Lecture 50 EIGRP Lab: Questions
Lecture 51 EIGRP Lab: Answers
Lecture 52 EIGRP Troubleshooting Lab 1: Question
Lecture 53 EIGRP Troubleshooting Lab 1: Answers
Lecture 54 EIGRP Troubleshooting Lab 2: Question
Lecture 55 EIGRP Troubleshooting Lab 2: Answers
Lecture 56 BGP Lab: Question
Lecture 57 BGP Lab: Answers
Lecture 58 BGP Troubleshooting Lab: Question
Lecture 59 BGP Troubleshooting Lab: Answers
Section 8: Wireshark Tips and Tricks
Lecture 60 Quick Wireshark Filters
Lecture 61 Wireshark Profiles
Lecture 62 Wireshark Conversation Filters
Lecture 63 Wireshark Statistics
Lecture 64 Wireshark Protocol Hierarchy
Lecture 65 Wireshark Conversations and IO Graph
Lecture 66 Wireshark Flow Graph
Section 9: tshark and Termshark
Lecture 67 Overview and tshark install and packet capture
Lecture 68 Termshark
Section 10: Python Wireshark scripting
Lecture 69 tshark and Pyshark installation
Lecture 70 Basic Pyshark testing
Lecture 71 Pyshark script
Section 11: Python Wireshark Password Captures
Lecture 72 Lab overview and setup
Lecture 73 iPython and interactive OSPF script
Lecture 74 OSPF Password Python script
Lecture 75 FTP Password Capture Python script
Lecture 76 Telnet Password Capture Python Script
Section 12: Kali Linux: Installation
Lecture 77 Import Kali Linux (Windows 10 / VirtualBox)
Section 13: Kali Linux: Network Attack Demonstrations
Lecture 78 Network Overview
Lecture 79 DTP Attack Demo
Lecture 80 VTP Attack Demo Part 1
Lecture 81 VTP Attack Demo Part 2
Lecture 82 Spanning Tree Attack Demo
Lecture 83 Demo: Mitigation of attacks
Section 14: Kali Linux: DHCP attacks and Man-in-the-middle attack
Lecture 84 Overview of lab
Lecture 85 DHCP Starvation attack
Lecture 86 Rogue DHCP Server; MITM attack, Wireshark password sniffing
Section 15: Wireshark Quiz Questions
Lecture 87 Don’t worry!
Lecture 88 Wireshark Quiz 1
Lecture 89 Wireshark Quiz 1 Answers
Lecture 90 Wireshark Quiz 2
Lecture 91 Wireshark Quiz 2 Answers
Lecture 92 Wireshark Quiz 3
Lecture 93 Wireshark Quiz 3 Answers
Lecture 94 Wireshark Quiz 4
Lecture 95 Wireshark Quiz 4 Answers
Lecture 96 Wireshark Quiz 5
Lecture 97 Wireshark Quiz 5 Answers
Lecture 98 Wireshark Quiz 6
Lecture 99 Wireshark Quiz 6 Answers
Lecture 100 Wireshark Quiz 7
Lecture 101 Wireshark Quiz 7 Answers
Lecture 102 Wireshark Quiz 8
Lecture 103 Wireshark Quiz 8 Answers
Lecture 104 Wireshark Quiz 9
Lecture 105 Wireshark Quiz 9 Answers
Lecture 106 Wireshark Quiz 10
Lecture 107 Wireshark Quiz 10 Answers
Lecture 108 Wireshark Quiz 11
Lecture 109 Wireshark Quiz 11 Answers
Lecture 110 Wireshark Quiz 12
Lecture 111 Wireshark Quiz 12 Answers
Lecture 112 Wireshark Quiz 13
Lecture 113 Wireshark Quiz 13 Answers
Lecture 114 Wireshark Quiz 14
Lecture 115 Wireshark Quiz 14 Answers
Lecture 116 Wireshark Quiz 15
Lecture 117 Wireshark Quiz 15 Answers
Lecture 118 Wireshark Quiz 16
Lecture 119 Wireshark Quiz 16 Answers
Lecture 120 Wireshark Quiz 17
Lecture 121 Wireshark Quiz 17 Answers
Lecture 122 Wireshark Quiz 18
Lecture 123 Wireshark Quiz 18 Answers
Lecture 124 Wireshark Quiz 19
Lecture 125 Wireshark Quiz 19 Answers
Lecture 126 Wireshark Quiz 20
Lecture 127 Wireshark Quiz 20 Answers
Lecture 128 Wireshark Quiz 21
Lecture 129 Wireshark Quiz 21 Answers
Lecture 130 Wireshark Quiz 22
Lecture 131 Wireshark Quiz 22 Answers
Lecture 132 Wireshark Quiz 23
Lecture 133 Wireshark Quiz 23 Answers
Section 16: VTP Theory and demonstrations
Lecture 134 Make a choice
Lecture 135 VTP Overview
Lecture 136 VTP Overview Part 2
Lecture 137 VTP Modes
Lecture 138 VTP Versions
Lecture 139 VTP on real 3750 switch
Lecture 140 VTP – Demo: Erase switch config
Lecture 141 VTP Pruning
Lecture 142 VTP Defaults
Lecture 143 VTP Warnings!
Lecture 144 VTP Demo: Overview & Switch 1 config
Lecture 145 VTP Demo: Autonegotiation S2
Lecture 146 VTP Demo: VTP Client
Lecture 147 VTP Demo: Client overrides server
Lecture 148 VTP Network Meltdown! VLANs removed from database!
Lecture 149 VTP Demo: Network Back Again and Transparent Mode
Lecture 150 VTP: Physical swtiches auto learn VTP domain
Section 17: Spanning Tree theory and demonstrations
Lecture 151 Spanning Tree Overview
Lecture 152 Versions of Spanning Tree
Lecture 153 Why is Spanning Tree Required?
Lecture 154 BPDUs and Bridge IDs
Lecture 155 Demo: STP Root
Lecture 156 Root Ports and Designated Ports
Lecture 157 Extended Bridge ID
Lecture 158 PortFast
Lecture 159 Path Cost Part 1
Lecture 160 Path Cost Part 2
Lecture 161 Path Cost Part 3
Lecture 162 PVST versus RPVST Port States
Lecture 163 RPVST and PVST Interoperability and 802.1w and 802.1s Overview
Lecture 164 802.1w and 802.1s Overview
Lecture 165 802.1w
Lecture 166 Demo: 802.1w
Lecture 167 802.1w Link Types
Lecture 168 802.1w Proposals
Lecture 169 802.1s / MSTP
Lecture 170 Spanning Tree Comparison Summary
Section 18: Port SPAN (Mirroring) theory and demonstrations
Lecture 171 SPAN Introduction
Lecture 172 SPAN network overview
Lecture 173 Tests before SPAN
Lecture 174 Configure SPAN
Lecture 175 SPAN Ingress Options
Lecture 176 SPAN Options
Lecture 177 SPAN – Multiple Sessions
Section 19: BGP theory and demonstrations
Lecture 178 BGP and the CCNA
Lecture 179 BGP Overview
Lecture 180 BGP Looking Glass
Lecture 181 GNS3 BGP Part 1
Lecture 182 GNS3 BGP Part 2
Lecture 183 GNS3 BGP Part 3
Lecture 184 GNS3 BGP Part 4
Lecture 185 GNS3 BGP Part 5
Lecture 186 GNS3 BGP Part 6
Lecture 187 GNS3 BGP Part 7
Lecture 188 GNS3 BGP Part 8
Lecture 189 GNS3 BGP Part 9
Lecture 190 GNS3 BGP Part 10
Section 20: Dynamic Trunk Protocol – DTP
Lecture 191 DTP Theory
Lecture 192 DTP GNS3 Demo Part 1
Lecture 193 DTP GNS3 Demo Part 2
Lecture 194 DTP GNS3 Demo Part 3
Lecture 195 CCNA Dynamic Trunking Protocol (DTP) Quiz: Can you answer the ccna quiz question
Section 21: CDP Overview
Lecture 196 CDP Introduction
Lecture 197 CDP Demo
Section 22: GNS3 Campus 1: CDP and LLDP
Lecture 198 CDP Demo: Basic discovery
Lecture 199 CDP Demo: Disable globally and per interface
Lecture 200 CDP Demo: Command Options
Lecture 201 LLDP Demo: Discover Linux Servers
Section 23: Port Security
Lecture 202 Port Security Overview
Lecture 203 Port Security and security mechanisms
Lecture 204 MAC addresses Port Security: Static, Dynamic, Sticky
Lecture 205 Port Security Demo Part 1
Lecture 206 Port Security Demo Part 2
Lecture 207 Port Security Demo: Sticky
Lecture 208 Port Security Error disable and auto recovery
Network Engineers,Network Architects,Ethical hackers,Networking Students
Course Information:
Udemy | English | 14h 15m | 16.42 GB
Created by: David Bombal
You Can See More Courses in the IT & Software >> Greetings from CourseDown.com