Wireshark for Packet Analysis and Ethical Hacking

Wireshark for Packet Analysis and Ethical Hacking

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 14h 05m | 8.02 GB

Basic-to-advanced network analysis using Wireshark! Ethical Hacking via Kali Linux: passwords, security, and protocols

Learn Wireshark practically. Wireshark pcapng files are provided so you can practice while you learn! There is so much to learn in this course:

Capture Telnet, FTP, TFTP, HTTP passwords.

Replay VoIP conversations.

Capture routing protocol (OSPF) authentication passwords.

Troubleshoot network issues

The course is very practical; you’ll practice while you learn how to analyze and interpret network protocols and use Wireshark for the purpose it was originally intended for deep packet inspection and network analysis.

We also show you have to hack network protocols (such as DTP, VTP, STP, and DHCP) using the ethical hacking tools included in Kali Linux.

Learn

  • Learn how to troubleshoot networks using Wireshark
  • Capture VoIP, OSPF, HTTP, Telnet, and many other protocols using Wireshark
  • Learn how to use Wireshark for Ethical hacking
  • Improve your job prospects by adding Wireshark to your résumé
  • Hack network protocols using Kali Linux
Table of Contents

Introduction
1 Introduction
2 Wireshark Installation Windows
3 Wireshark Installation Mac OS

Wireshark Basics
4 The best way to learn!
5 Capture frames packets segments
6 Why are no packets captured
7 Port SPAN Mirroring

OSI Model
8 OSI Model – Part 1 – OSI Model Introduction
9 OSI Model – Part 2 – OSI Model Layers
10 OSI Model – Part 3 – Split of concentration
11 OSI Model – Part 4 – Layer 7 Application Layer
12 OSI Model – Part 5 – Layer 6 Presentation Layer
13 OSI Model – Part 6 – Layer 5 Session Layer
14 OSI Model – Part 7 – Top layers versus lower layers
15 OSI Model – Part 8 – Transport Layer
16 OSI Model – Part 9 – Network Layer
17 OSI Model – Part 10 – Data Link Layer
18 OSI Model – Part 11 – Physical Layer
19 OSI Model – Part 12 – Host Communication
20 OSI Model – Part 13 – Encapsulation
21 OSI Model – Part 14 – TCPIP versus OSI Model

Wireshark Filters
22 Wireshark Display filters
23 Practical Demonstration of Wireshark Display filters
24 Two types of filters
25 Wireshark Capture Filters
26 Wireshark Filters IP address protocols

Wireshark Hacking Passwords
27 Telnet Password & Data Captures
28 TFTP Password & Data Capture
29 FTP Password & Data Capture
30 HTTP Data Capture
31 Cisco router HTTP Password Capture

Hacking VoIP
32 Replay Voice over IP calls (Virtual IP Phones)
33 Capture and replay voice calls (Virtual & Physical IP Phones)

Protocol Analysis Can you troubleshoot the network
34 DTP Lab Quiz
35 DTP Lab Answers
36 CDP, LLDP Lab Quiz
37 CDP, LLDP Lab Answers
38 OSPF Lab Quiz
39 OSPF Lab Answers Part 1
40 OSPF Lab Answers Part 2
41 OSPF Troubleshooting Lab 1 Question
42 OSPF Troubleshooting Lab 1 Answers
43 OSPF Troubleshooting Lab 2 Question
44 OSPF Troubleshooting Lab 2 Answers
45 OSPF Troubleshooting Lab 3 Question
46 OSPF Troubleshooting Lab 3 Answers
47 EIGRP Lab Questions
48 EIGRP Lab Answers
49 EIGRP Troubleshooting Lab 1 Question
50 EIGRP Troubleshooting Lab 1 Answers
51 EIGRP Troubleshooting Lab 2 Question
52 EIGRP Troubleshooting Lab 2 Answers
53 BGP Lab Question
54 BGP Lab Answers
55 BGP Troubleshooting Lab Question
56 BGP Troubleshooting Lab Answers

Wireshark Tips and Tricks
57 Quick Wireshark Filters
58 Wireshark Profiles
59 Wireshark Conversation Filters
60 Wireshark Statistics
61 Wireshark Protocol Hierarchy
62 Wireshark Conversations and IO Graph
63 Wireshark Flow Graph

tshark and Termshark
64 Overview and tshark install and packet capture
65 Termshark

Python Wireshark scripting
66 tshark and Pyshark installation
67 Basic Pyshark testing
68 Pyshark script

Python Wireshark Password Captures
69 Lab overview and setup
70 iPython and interactive OSPF script
71 OSPF Password Python script
72 FTP Password Capture Python script
73 Telnet Password Capture Python Script

Kali Linux Installation
74 Import Kali Linux (Windows 10 VirtualBox)

Kali Linux Network Attack Demonstrations
75 Network Overview
76 DTP Attack Demo
77 VTP Attack Demo Part 1
78 VTP Attack Demo Part 2
79 Spanning Tree Attack Demo
80 Demo Mitigation of attacks

Kali Linux DHCP attacks and Man-in-the-middle attack
81 Overview of lab
82 DHCP Starvation attack
83 Rogue DHCP Server; MITM attack, Wireshark password sniffing

VTP Theory and demonstrations
84 VTP Overview
85 VTP Overview Part 2
86 VTP Modes
87 VTP Versions
88 VTP on real 3750 switch
89 VTP – Demo Erase switch config
90 VTP Pruning
91 VTP Defaults
92 VTP Warnings!
93 VTP Demo Overview & Switch 1 config
94 VTP Demo Autonegotiation S2
95 VTP Demo VTP Client
96 VTP Demo Client overrides server
97 VTP Network Meltdown! VLANs removed from database!
98 VTP Demo Network Back Again and Transparent Mode
99 VTP Physical swtiches auto learn VTP domain

Spanning Tree theory and demonstrations
100 Spanning Tree Overview
101 Versions of Spanning Tree
102 Why is Spanning Tree Required
103 BPDUs and Bridge IDs
104 Demo STP Root
105 Root Ports and Designated Ports
106 Extended Bridge ID
107 PortFast
108 Path Cost Part 1
109 Path Cost Part 2
110 Path Cost Part 3
111 PVST versus RPVST Port States
112 RPVST and PVST Interoperability and 802.1w and 802.1s Overview
113 w and 802.1s Overview
114 w
115 Demo 802.1w
116 w Link Types
117 w Proposals
118 s MSTP
119 Spanning Tree Comparison Summary

Port SPAN (Mirroring) theory and demonstrations
120 SPAN Introduction
121 SPAN network overview
122 Tests before SPAN
123 Configure SPAN
124 SPAN Ingress Options
125 SPAN Options
126 SPAN – Multiple Sessions

BGP theory and demonstrations
127 BGP and the CCNA
128 BGP Overview
129 BGP Looking Glass
130 GNS3 BGP Part 1
131 GNS3 BGP Part 2
132 GNS3 BGP Part 3
133 GNS3 BGP Part 4
134 GNS3 BGP Part 5
135 GNS3 BGP Part 6
136 GNS3 BGP Part 7
137 GNS3 BGP Part 8
138 GNS3 BGP Part 9
139 GNS3 BGP Part 10

Dynamic Trunk Protocol – DTP
140 DTP Theory
141 DTP GNS3 Demo Part 1
142 DTP GNS3 Demo Part 2
143 DTP GNS3 Demo Part 3
144 CCNA Dynamic Trunking Protocol (DTP) Quiz

CDP Overview
145 CDP Introduction
146 CDP Demo

GNS3 Campus 1 CDP and LLDP (ICND1)
147 CDP Demo Basic discovery
148 CDP Demo Disable globally and per interface
149 CDP Demo Command Options
150 LLDP Demo Discover Linux Servers

Port Security
151 Port Security Overview
152 Port Security and security mechanisms
153 MAC addresses Port Security Static, Dynamic, Sticky
154 Port Security Demo Part 1
155 Port Security Demo Part 2
156 Port Security Demo Sticky
157 Port Security Error disable and auto recovery