Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Start Using Wireshark to Hack like a Pro
Training Overview
Description of Training
Video Overview (1:27)
Course Overview
Introduction (1:20)
Course Setup: First Steps of Protocol Analysis
Download and Install Wireshark (2:56)
Work with Wireshark (6:30)
Review the First Packet capture in Wireshark. (3:31)
Network Communication at the Packet Level
Introduction (5:08)
Analyze Client to Server Communication with the Wireshark User Interface. (6:48)
Your first protocols (4:57)
Examine protocol packets within the Wireshark tool. (6:22)
TCP/IP Foundation
Introduction (4:05)
Protocol Analysis at the network level using Wireshark (4:17)
Interpreting Connections and Protocols (2:23)
Intermediate Protocol Analysis of static captures using Wireshark (3:45)
Starting your First Capture
Introduction (2:45)
Live capture exercise (6:43)
Analyzing the live capture using Wireshark (9:26)
Working with Capture Files in Wireshark
Introduction (3:09)
Saving the capture to a file (5:30)
Advanced Capture Methods (3:07)
Advanced Capture Scenario Analysis Methods With Wireshark (6:33)
Analyzing Packet Captures
Introduction (2:25)
Creating Wireshark filters (5:26)
Examining Protocol Communication
Introduction (8:26)
Attacking the network communication and identifying artifacts with Wireshark (7:57)
Applying your skills to identify potential incidents within Wireshark captures (15:51)
Bonus Capture Files
Bonus-File1 capture file (2:09)
Bonus-File1 Solution (12:08)
Bonus File2 capture File (1:24)
Bonus-File2 Solution (18:14)
The Steps of Professional Hacking
The first step of professional hacking scanning methodology (4:43)
The second step of the professional hacking methodology (7:02)
The third step of the professional hacking methodology (2:56)
The fourth step of the professional hacking methodology (6:51)
The fifth step of the professional hacking methodology (6:45)
The sixth step of the professional hacking methodology (7:05)
Working with Malware Capture Files (7:17)
File extraction using Wireshark (9:32)
Audio Version of the Training
Audio Download
Audio Download
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock