4.6 out of 5
4.6
7669 reviews on Udemy

Wireshark: Packet Analysis and Ethical Hacking: Core Skills

From basic to advanced network analysis using Wireshark! Ethical Hacking using Kali Linux: Passwords, Security, Protocol
Instructor:
David Bombal
233,452 students enrolled
English [CC] More
Learn how to troubleshoot networks using Wireshark.
Capture VoIP, OSPF, HTTP, Telnet and many other protocols using Wireshark.
Learn how to use Wireshark for Ethical hacking.
Improve your job prospects by adding Wireshark to your resume.
Understand and interpret network protocols.
Hack Network Protocols using Kali Linux

Learn Wireshark practically. Wireshark pcapng files provided so you can practice while you learn! There is so much to learn in this course:

– Capture Telnet, FTP, TFTP, HTTP passwords.

– Replay VoIP conversations.

– Capture routing protocol (OSPF) authentication passwords.

– Troubleshoot network issues.

– Free software.

– Free downloadable pcapng files.

– Answer quiz questions.

The course is very practical. You can practice while you learn!

Learn how to analyze and interpret network protocols and leverage Wireshark for what it was originally intended: Deep Packet Inspection and network analysis.

I also show you have to hack network protocols using Kali Linux! Hack network protocols like DTP, VTP, STP and DHCP using Ethical hacking tools included in Kali Linux.

Updates: Now includes Python scripting to automatically capture packets from the network using tshark. Lean how to automate your captures and learn how to hack the network using Python and Wireshark.

Protocols we capture and discuss in this course include:

– Telnet

– FTP

– TFTP

– HTTP

– VoIP

– OSPF

– EIGRP

– DNS

– ICMP

– DTP

–  VTP

– STP

– DHCP

Introduction

1
Introduction
2
Answering your questions
3
Udemy Tips and Tricks
4
Wireshark Installation: Windows
5
Wireshark Installation: Mac OS

Wireshark Basics

1
The best way to learn!
2
Capture frames / packets / segments
3
Why are no packets captured?
4
Port SPAN / Mirroring

OSI Model

1
Make a choice
2
OSI Model - Part 1 - OSI Model Introduction
3
OSI Model - Part 2 - OSI Model Layers
4
OSI Model - Part 3 - Split of concentration
5
OSI Model - Part 4 - Layer 7 Application Layer
6
OSI Model - Part 5 - Layer 6 Presentation Layer
7
OSI Model - Part 6 - Layer 5 Session Layer
8
OSI Model - Part 7 - Top layers versus lower layers
9
OSI Model - Part 8 - Transport Layer
10
OSI Model - Part 9 - Network Layer
11
OSI Model - Part 10 - Data Link Layer
12
OSI Model - Part 11 - Physical Layer
13
OSI Model - Part 12 - Host Communication
14
OSI Model - Part 13 - Encapsulation
15
OSI Model - Part 14 - TCPIP versus OSI Model

Wireshark Filters

1
Wireshark Display filters
2
Practical Demonstration of Wireshark Display filters
3
Two types of filters
4
Wireshark Capture Filters
5
Wireshark Filters: IP address / protocols

Wireshark: Hacking Passwords

1
Telnet Password & Data Captures
2
TFTP Password & Data Capture
3
FTP Password & Data Capture
4
HTTP Data Capture
5
Cisco router HTTP Password Capture

Hacking VoIP

1
Replay Voice over IP calls (Virtual IP Phones)
2
Capture and replay voice calls (Virtual & Physical IP Phones)

Protocol Analysis: Can you troubleshoot the network?

1
DTP Lab: Quiz
2
DTP Lab: Answers
3
CDP, LLDP Lab: Quiz
4
CDP, LLDP Lab: Answers
5
OSPF Lab: Quiz
6
OSPF Lab: Answers Part 1
7
OSPF Lab: Answers Part 2
8
OSPF Troubleshooting Lab 1: Question
9
OSPF Troubleshooting Lab 1: Answers
10
OSPF Troubleshooting Lab 2: Question
11
OSPF Troubleshooting Lab 2: Answers
12
OSPF Troubleshooting Lab 3: Question
13
OSPF Troubleshooting Lab 3: Answers
14
EIGRP Lab: Questions
15
EIGRP Lab: Answers
16
EIGRP Troubleshooting Lab 1: Question
17
EIGRP Troubleshooting Lab 1: Answers
18
EIGRP Troubleshooting Lab 2: Question
19
EIGRP Troubleshooting Lab 2: Answers
20
BGP Lab: Question
21
BGP Lab: Answers
22
BGP Troubleshooting Lab: Question
23
BGP Troubleshooting Lab: Answers

Wireshark Tips and Tricks

1
Quick Wireshark Filters
2
Wireshark Profiles
3
Wireshark Conversation Filters
4
Wireshark Statistics
5
Wireshark Protocol Hierarchy
6
Wireshark Conversations and IO Graph
7
Wireshark Flow Graph

tshark and Termshark

1
Overview and tshark install and packet capture
2
Termshark

Python Wireshark scripting

1
tshark and Pyshark installation
2
Basic Pyshark testing
3
Pyshark script

Python Wireshark Password Captures

1
Lab overview and setup
2
iPython and interactive OSPF script
3
OSPF Password Python script
4
FTP Password Capture Python script
5
Telnet Password Capture Python Script

Kali Linux: Installation

1
Import Kali Linux (Windows 10 / VirtualBox)

Kali Linux: Network Attack Demonstrations

1
Network Overview
2
DTP Attack Demo
3
VTP Attack Demo Part 1
4
VTP Attack Demo Part 2
5
Spanning Tree Attack Demo
6
Demo: Mitigation of attacks

Kali Linux: DHCP attacks and Man-in-the-middle attack

1
Overview of lab
2
DHCP Starvation attack
3
Rogue DHCP Server; MITM attack, Wireshark password sniffing
You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
4.6
4.6 out of 5
7669 Ratings

Detailed Rating

Stars 5
5087
Stars 4
2040
Stars 3
432
Stars 2
70
Stars 1
33