From basic to advanced network analysis using Wireshark! Ethical Hacking using Kali Linux: Passwords, Security, Protocol

What you will learn

Learn how to troubleshoot networks using Wireshark.

Capture VoIP, OSPF, HTTP, Telnet and many other protocols using Wireshark.

Learn how to use Wireshark for Ethical hacking.

Improve your job prospects by adding Wireshark to your resume.

Understand and interpret network protocols.

Hack Network Protocols using Kali Linux

Description

Learn Wireshark practically. Wireshark pcapng files provided so you can practice while you learn! There is so much to learn in this course:

– Capture Telnet, FTP, TFTP, HTTP passwords.

– Replay VoIP conversations.

– Capture routing protocol (OSPF) authentication passwords.

– Troubleshoot network issues.

– Free software.

– Free downloadable pcapng files.

– Answer quiz questions.

The course is very practical. You can practice while you learn!

Learn how to analyze and interpret network protocols and leverage Wireshark for what it was originally intended: Deep Packet Inspection and network analysis.

I also show you have to hack network protocols using Kali Linux! Hack network protocols like DTP, VTP, STP and DHCP using Ethical hacking tools included in Kali Linux.

Updates: Now includes Python scripting to automatically capture packets from the network using tshark. Lean how to automate your captures and learn how to hack the network using Python and Wireshark.

Protocols we capture and discuss in this course include:

– Telnet

– FTP

– TFTP

– HTTP

– VoIP

– OSPF

– EIGRP

– DNS

– ICMP

– DTP

–  VTP

– STP

– DHCP

English

Language

Content

Introduction

Introduction

Wireshark Installation: Windows

Wireshark Installation: Mac OS

Wireshark Basics

The best way to learn!

Capture frames / packets / segments

Why are no packets captured?

Port SPAN / Mirroring

OSI Model

Make a choice

OSI Model – Part 1 – OSI Model Introduction

OSI Model – Part 2 – OSI Model Layers

OSI Model – Part 3 – Split of concentration

OSI Model – Part 4 – Layer 7 Application Layer

OSI Model – Part 5 – Layer 6 Presentation Layer

OSI Model – Part 6 – Layer 5 Session Layer

OSI Model – Part 7 – Top layers versus lower layers

OSI Model – Part 8 – Transport Layer

OSI Model – Part 9 – Network Layer

OSI Model – Part 10 – Data Link Layer

OSI Model – Part 11 – Physical Layer

OSI Model – Part 12 – Host Communication

OSI Model – Part 13 – Encapsulation

OSI Model – Part 14 – TCPIP versus OSI Model

Wireshark Filters

Wireshark Display filters

Practical Demonstration of Wireshark Display filters

Two types of filters

Wireshark Capture Filters

Wireshark Filters: IP address / protocols

Wireshark: Hacking Passwords

Telnet Password & Data Captures

TFTP Password & Data Capture

FTP Password & Data Capture

HTTP Data Capture

Cisco router HTTP Password Capture

Hacking VoIP

Replay Voice over IP calls (Virtual IP Phones)

Capture and replay voice calls (Virtual & Physical IP Phones)

Protocol Analysis: Can you troubleshoot the network?

DTP Lab: Quiz

DTP Lab: Answers

CDP, LLDP Lab: Quiz

CDP, LLDP Lab: Answers

OSPF Lab: Quiz

OSPF Lab: Answers Part 1

OSPF Lab: Answers Part 2

OSPF Troubleshooting Lab 1: Question

OSPF Troubleshooting Lab 1: Answers

OSPF Troubleshooting Lab 2: Question

OSPF Troubleshooting Lab 2: Answers

OSPF Troubleshooting Lab 3: Question

OSPF Troubleshooting Lab 3: Answers

EIGRP Lab: Questions

EIGRP Lab: Answers

EIGRP Troubleshooting Lab 1: Question

EIGRP Troubleshooting Lab 1: Answers

EIGRP Troubleshooting Lab 2: Question

EIGRP Troubleshooting Lab 2: Answers

BGP Lab: Question

BGP Lab: Answers

BGP Troubleshooting Lab: Question

BGP Troubleshooting Lab: Answers

Wireshark Tips and Tricks

Quick Wireshark Filters

Wireshark Profiles

Wireshark Conversation Filters

Wireshark Statistics

Wireshark Protocol Hierarchy

Wireshark Conversations and IO Graph

Wireshark Flow Graph

tshark and Termshark

Overview and tshark install and packet capture

Termshark

Python Wireshark scripting

tshark and Pyshark installation

Basic Pyshark testing

Pyshark script

Python Wireshark Password Captures

Lab overview and setup

iPython and interactive OSPF script

OSPF Password Python script

FTP Password Capture Python script

Telnet Password Capture Python Script

Kali Linux: Installation

Import Kali Linux (Windows 10 / VirtualBox)

Kali Linux: Network Attack Demonstrations

Network Overview

DTP Attack Demo

VTP Attack Demo Part 1

VTP Attack Demo Part 2

Spanning Tree Attack Demo

Demo: Mitigation of attacks

Kali Linux: DHCP attacks and Man-in-the-middle attack

Overview of lab

DHCP Starvation attack

Rogue DHCP Server; MITM attack, Wireshark password sniffing

Wireshark Quiz Questions


Get Instant Notification of New Courses on our Telegram channel.


Don’t worry!

Wireshark Quiz 1

Wireshark Quiz 1 Answers

Wireshark Quiz 2

Wireshark Quiz 2 Answers

Wireshark Quiz 3

Wireshark Quiz 3 Answers

Wireshark Quiz 4

Wireshark Quiz 4 Answers

Wireshark Quiz 5

Wireshark Quiz 5 Answers

Wireshark Quiz 6

Wireshark Quiz 6 Answers

Wireshark Quiz 7

Wireshark Quiz 7 Answers

Wireshark Quiz 8

Wireshark Quiz 8 Answers

Wireshark Quiz 9

Wireshark Quiz 9 Answers

Wireshark Quiz 10

Wireshark Quiz 10 Answers

Wireshark Quiz 11

Wireshark Quiz 11 Answers

Wireshark Quiz 12

Wireshark Quiz 12 Answers

Wireshark Quiz 13

Wireshark Quiz 13 Answers

Wireshark Quiz 14

Wireshark Quiz 14 Answers

Wireshark Quiz 15

Wireshark Quiz 15 Answers

Wireshark Quiz 16

Wireshark Quiz 16 Answers

Wireshark Quiz 17

Wireshark Quiz 17 Answers

Wireshark Quiz 18

Wireshark Quiz 18 Answers

Wireshark Quiz 19

Wireshark Quiz 19 Answers

Wireshark Quiz 20

Wireshark Quiz 20 Answers

Wireshark Quiz 21

Wireshark Quiz 21 Answers

Wireshark Quiz 22

Wireshark Quiz 22 Answers

Wireshark Quiz 23

Wireshark Quiz 23 Answers

VTP Theory and demonstrations

Make a choice

VTP Overview

VTP Overview Part 2

VTP Modes

VTP Versions

VTP on real 3750 switch

VTP – Demo: Erase switch config

VTP Pruning

VTP Defaults

VTP Warnings!

VTP Demo: Overview & Switch 1 config

VTP Demo: Autonegotiation S2

VTP Demo: VTP Client

VTP Demo: Client overrides server

VTP Network Meltdown! VLANs removed from database!

VTP Demo: Network Back Again and Transparent Mode

VTP: Physical swtiches auto learn VTP domain

Spanning Tree theory and demonstrations

Spanning Tree Overview

Versions of Spanning Tree

Why is Spanning Tree Required?

BPDUs and Bridge IDs

Demo: STP Root

Root Ports and Designated Ports

Extended Bridge ID

PortFast

Path Cost Part 1

Path Cost Part 2

Path Cost Part 3

PVST versus RPVST Port States

RPVST and PVST Interoperability and 802.1w and 802.1s Overview

802.1w and 802.1s Overview

802.1w

Demo: 802.1w

802.1w Link Types

802.1w Proposals

802.1s / MSTP

Spanning Tree Comparison Summary

Port SPAN (Mirroring) theory and demonstrations

SPAN Introduction

SPAN network overview

Tests before SPAN

Configure SPAN

SPAN Ingress Options

SPAN Options

SPAN – Multiple Sessions

BGP theory and demonstrations

BGP and the CCNA

BGP Overview

BGP Looking Glass

GNS3 BGP Part 1

GNS3 BGP Part 2

GNS3 BGP Part 3

GNS3 BGP Part 4

GNS3 BGP Part 5

GNS3 BGP Part 6

GNS3 BGP Part 7

GNS3 BGP Part 8

GNS3 BGP Part 9

GNS3 BGP Part 10

Dynamic Trunk Protocol – DTP

DTP Theory

DTP GNS3 Demo Part 1

DTP GNS3 Demo Part 2

DTP GNS3 Demo Part 3

CCNA Dynamic Trunking Protocol (DTP) Quiz: Can you answer the ccna quiz question

CDP Overview

CDP Introduction

CDP Demo

GNS3 Campus 1: CDP and LLDP (ICND1)

CDP Demo: Basic discovery

CDP Demo: Disable globally and per interface

CDP Demo: Command Options

LLDP Demo: Discover Linux Servers

Port Security

Port Security Overview

Port Security and security mechanisms

MAC addresses Port Security: Static, Dynamic, Sticky

Port Security Demo Part 1

Port Security Demo Part 2

Port Security Demo: Sticky

Port Security Error disable and auto recovery