Wireshark for Packet Analysis and Ethical Hacking

Video description

Basic-to-advanced network analysis using Wireshark! Ethical Hacking via Kali Linux: passwords, security, and protocols

About This Video

  • Explore how to troubleshoot networks and Capture VoIP, OSPF, HTTP, Telnet, and many other protocols using Wireshark
  • Analyze and interpret network protocols and use Wireshark for deep packet inspection and network analysis
  • Use Wireshark for Ethical hacking and hack network protocols using Kali Linux

In Detail

Learn Wireshark practically. Wireshark pcapng files are provided so you can practice while you learn! There is so much to learn in this course:

  • Capture Telnet, FTP, TFTP, HTTP passwords.
  • Replay VoIP conversations.
  • Capture routing protocol (OSPF) authentication passwords.
  • Troubleshoot network issues

The course is very practical; you'll practice while you learn how to analyze and interpret network protocols and use Wireshark for the purpose it was originally intended for deep packet inspection and network analysis.

We also show you have to hack network protocols (such as DTP, VTP, STP, and DHCP) using the ethical hacking tools included in Kali Linux.

Table of contents

  1. Chapter 1 : Introduction
    1. Introduction 00:10:42
    2. Wireshark Installation: Windows 00:05:51
    3. Wireshark Installation: Mac OS 00:03:06
  2. Chapter 2 : Wireshark Basics
    1. The best way to learn! 00:02:53
    2. Capture frames / packets / segments 00:14:53
    3. Why are no packets captured? 00:09:30
    4. Port SPAN / Mirroring 00:05:45
  3. Chapter 3 : OSI Model
    1. OSI Model - Part 1 - OSI Model Introduction 00:02:00
    2. OSI Model - Part 2 - OSI Model Layers 00:04:07
    3. OSI Model - Part 3 - Split of concentration 00:06:27
    4. OSI Model - Part 4 - Layer 7 Application Layer 00:02:42
    5. OSI Model - Part 5 - Layer 6 Presentation Layer 00:02:06
    6. OSI Model - Part 6 - Layer 5 Session Layer 00:01:23
    7. OSI Model - Part 7 - Top layers versus lower layers 00:00:23
    8. OSI Model - Part 8 - Transport Layer 00:04:53
    9. OSI Model - Part 9 - Network Layer 00:02:59
    10. OSI Model - Part 10 - Data Link Layer 00:03:26
    11. OSI Model - Part 11 - Physical Layer 00:04:30
    12. OSI Model - Part 12 - Host Communication 00:03:37
    13. OSI Model - Part 13 - Encapsulation 00:02:52
    14. OSI Model - Part 14 - TCPIP versus OSI Model 00:06:12
  4. Chapter 4 : Wireshark Filters
    1. Wireshark Display filters 00:02:46
    2. Practical Demonstration of Wireshark Display filters 00:10:49
    3. Two types of filters 00:01:35
    4. Wireshark Capture Filters 00:04:52
    5. Wireshark Filters: IP address / protocols 00:08:16
  5. Chapter 5 : Wireshark: Hacking Passwords
    1. Telnet Password & Data Captures 00:09:00
    2. TFTP Password & Data Capture 00:03:06
    3. FTP Password & Data Capture 00:01:38
    4. HTTP Data Capture 00:04:58
    5. Cisco router HTTP Password Capture 00:07:50
  6. Chapter 6 : Hacking VoIP
    1. Replay Voice over IP calls (Virtual IP Phones) 00:15:57
    2. Capture and replay voice calls (Virtual & Physical IP Phones) 00:06:47
  7. Chapter 7 : Protocol Analysis: Can you troubleshoot the network
    1. DTP Lab: Quiz 00:00:52
    2. DTP Lab: Answers 00:08:48
    3. CDP, LLDP Lab: Quiz 00:01:57
    4. CDP, LLDP Lab: Answers 00:08:33
    5. OSPF Lab: Quiz 00:02:36
    6. OSPF Lab: Answers Part 1 00:14:09
    7. OSPF Lab: Answers Part 2 00:02:06
    8. OSPF Troubleshooting Lab 1: Question 00:01:53
    9. OSPF Troubleshooting Lab 1: Answers 00:11:28
    10. OSPF Troubleshooting Lab 2: Question 00:01:45
    11. OSPF Troubleshooting Lab 2: Answers 00:05:31
    12. OSPF Troubleshooting Lab 3: Question 00:01:25
    13. OSPF Troubleshooting Lab 3: Answers 00:07:28
    14. EIGRP Lab: Questions 00:01:23
    15. EIGRP Lab: Answers 00:08:08
    16. EIGRP Troubleshooting Lab 1: Question 00:01:15
    17. EIGRP Troubleshooting Lab 1: Answers 00:05:10
    18. EIGRP Troubleshooting Lab 2: Question 00:00:59
    19. EIGRP Troubleshooting Lab 2: Answers 00:03:10
    20. BGP Lab: Question 00:01:20
    21. BGP Lab: Answers 00:11:10
    22. BGP Troubleshooting Lab: Question 00:01:04
    23. BGP Troubleshooting Lab: Answers 00:07:16
  8. Chapter 8 : Wireshark Tips and Tricks
    1. Quick Wireshark Filters 00:04:00
    2. Wireshark Profiles 00:07:44
    3. Wireshark Conversation Filters 00:01:42
    4. Wireshark Statistics 00:05:14
    5. Wireshark Protocol Hierarchy 00:05:48
    6. Wireshark Conversations and IO Graph 00:05:29
    7. Wireshark Flow Graph 00:04:48
  9. Chapter 9 : tshark and Termshark
    1. Overview and tshark install and packet capture 00:05:50
    2. Termshark 00:05:56
  10. Chapter 10 : Python Wireshark scripting
    1. tshark and Pyshark installation 00:05:10
    2. Basic Pyshark testing 00:09:26
    3. Pyshark script 00:06:34
  11. Chapter 11 : Python Wireshark Password Captures
    1. Lab overview and setup 00:06:40
    2. iPython and interactive OSPF script 00:06:11
    3. OSPF Password Python script 00:06:34
    4. FTP Password Capture Python script 00:05:04
    5. Telnet Password Capture Python Script 00:05:18
  12. Chapter 12 : Kali Linux: Installation
    1. Import Kali Linux (Windows 10 / VirtualBox) 00:09:05
  13. Chapter 13 : Kali Linux: Network Attack Demonstrations
    1. Network Overview 00:03:49
    2. DTP Attack Demo 00:04:21
    3. VTP Attack Demo Part 1 00:05:22
    4. VTP Attack Demo Part 2 00:09:04
    5. Spanning Tree Attack Demo 00:02:18
    6. Demo: Mitigation of attacks 00:04:36
  14. Chapter 14 : Kali Linux: DHCP attacks and Man-in-the-middle attack
    1. Overview of lab 00:04:15
    2. DHCP Starvation attack 00:03:48
    3. Rogue DHCP Server; MITM attack, Wireshark password sniffing 00:06:55
  15. Chapter 15 : VTP Theory and demonstrations
    1. VTP Overview 00:05:27
    2. VTP Overview Part 2 00:05:17
    3. VTP Modes 00:06:13
    4. VTP Versions 00:01:22
    5. VTP on real 3750 switch 00:06:05
    6. VTP - Demo: Erase switch config 00:00:31
    7. VTP Pruning 00:04:29
    8. VTP Defaults 00:00:46
    9. VTP Warnings! 00:02:00
    10. VTP Demo: Overview & Switch 1 config 00:06:43
    11. VTP Demo: Autonegotiation S2 00:04:45
    12. VTP Demo: VTP Client 00:06:51
    13. VTP Demo: Client overrides server 00:08:43
    14. VTP Network Meltdown! VLANs removed from database! 00:08:29
    15. VTP Demo: Network Back Again and Transparent Mode 00:02:40
    16. VTP: Physical swtiches auto learn VTP domain 00:04:46
  16. Chapter 16 : Spanning Tree theory and demonstrations
    1. Spanning Tree Overview 00:02:05
    2. Versions of Spanning Tree 00:04:07
    3. Why is Spanning Tree Required? 00:07:27
    4. BPDUs and Bridge IDs 00:02:38
    5. Demo: STP Root 00:07:37
    6. Root Ports and Designated Ports 00:08:25
    7. Extended Bridge ID 00:04:17
    8. PortFast 00:02:35
    9. Path Cost Part 1 00:01:43
    10. Path Cost Part 2 00:05:30
    11. Path Cost Part 3 00:04:22
    12. PVST versus RPVST Port States 00:08:23
    13. RPVST and PVST Interoperability and 802.1w and 802.1s Overview 00:02:36
    14. 802.1w and 802.1s Overview 00:03:03
    15. 802.1w 00:07:10
    16. Demo: 802.1w 00:07:20
    17. 802.1w Link Types 00:03:07
    18. 802.1w Proposals 00:06:18
    19. 802.1s / MSTP 00:06:23
    20. Spanning Tree Comparison Summary 00:03:35
  17. Chapter 17 : Port SPAN (Mirroring) theory and demonstrations
    1. SPAN Introduction 00:01:11
    2. SPAN network overview 00:01:57
    3. Tests before SPAN 00:06:28
    4. Configure SPAN 00:08:28
    5. SPAN Ingress Options 00:03:40
    6. SPAN Options 00:06:14
    7. SPAN - Multiple Sessions 00:03:25
  18. Chapter 18 : BGP theory and demonstrations
    1. BGP and the CCNA 00:01:28
    2. BGP Overview 00:02:57
    3. BGP Looking Glass 00:05:48
    4. GNS3 BGP Part 1 00:03:05
    5. GNS3 BGP Part 2 00:08:29
    6. GNS3 BGP Part 3 00:09:35
    7. GNS3 BGP Part 4 00:07:55
    8. GNS3 BGP Part 5 00:03:44
    9. GNS3 BGP Part 6 00:11:04
    10. GNS3 BGP Part 7 00:08:19
    11. GNS3 BGP Part 8 00:04:28
    12. GNS3 BGP Part 9 00:07:11
    13. GNS3 BGP Part 10 00:03:49
  19. Chapter 19 : Dynamic Trunk Protocol - DTP
    1. DTP Theory 00:02:08
    2. DTP GNS3 Demo Part 1 00:07:10
    3. DTP GNS3 Demo Part 2 00:03:38
    4. DTP GNS3 Demo Part 3 00:07:33
    5. CCNA Dynamic Trunking Protocol (DTP) Quiz: 00:28:07
  20. Chapter 20 : CDP Overview
    1. CDP Introduction 00:09:44
    2. CDP Demo 00:06:17
  21. Chapter 21 : GNS3 Campus 1: CDP and LLDP (ICND1)
    1. CDP Demo: Basic discovery 00:07:28
    2. CDP Demo: Disable globally and per interface 00:06:50
    3. CDP Demo: Command Options 00:04:21
    4. LLDP Demo: Discover Linux Servers 00:06:34
  22. Chapter 22 : Port Security
    1. Port Security Overview 00:03:14
    2. Port Security and security mechanisms 00:01:23
    3. MAC addresses Port Security: Static, Dynamic, Sticky 00:03:11
    4. Port Security Demo Part 1 00:09:03
    5. Port Security Demo Part 2 00:09:19
    6. Port Security Demo: Sticky 00:02:53
    7. Port Security Error disable and auto recovery 00:05:14

Product information

  • Title: Wireshark for Packet Analysis and Ethical Hacking
  • Author(s): David Bombal
  • Release date: September 2019
  • Publisher(s): Packt Publishing
  • ISBN: 9781839212352