From the course: CompTIA PenTest (PT0-002) Cert Prep
Unlock this course with a free trial
Join today to access over 23,200 courses taught by industry experts.
Packet inspection demo
From the course: CompTIA PenTest (PT0-002) Cert Prep
Packet inspection demo
- Okay, so let's take a look at how we can actually grab some network traffic off the wire and look at it. So we're going to do a little bit of packet inspection. So the first thing we need to do is we need some sort of tool that'll help us go out to the network, grab information, show it to us and help us figure out what's going on inside each of these packets. So we're going to look at Wireshark. Wireshark is a very popular tool, and keep in mind that for the context of this exam, we're not going to give you a tutorial on exactly how every aspect of the tool works. It's just important that you understand what the use case is for the tool, what it looks like, and what some of the output would be, and what's the utility value. So Wireshark is very helpful for information gathering and for packet inspection. So let's take a look at Wireshark right now. I'm going to go into Kali, and I'm going to launch Wireshark. Now, we'll tour through Kali a little bit later, but the application…
Contents
-
-
-
-
Scanning and enumeration4m 16s
-
(Locked)
Scanning and demo10m 46s
-
(Locked)
Packet investigation7m 57s
-
(Locked)
Packet inspection demo5m 48s
-
(Locked)
Labtainers setup12m 9s
-
(Locked)
Labtainers lab: Wireshark8m 54s
-
(Locked)
Application and open-source resources11m 38s
-
(Locked)
Passive reconnaissance10m 7s
-
(Locked)
Active reconnaissance7m 50s
-
(Locked)
Vulnerability scanning8m 41s
-
(Locked)
Vulnerability scanning demo16m 20s
-
(Locked)
Labtainers lab: Network basics2m 50s
-
(Locked)
Labtainers lab: Nmap discovery3m 12s
-
(Locked)
Target considerations15m 36s
-
(Locked)
Analyzing scan output5m 1s
-
(Locked)
Nmap scoping and output options21m 4s
-
(Locked)
Nmap timing and performance options6m 31s
-
(Locked)
Prioritization of vulnerabilities9m 7s
-
(Locked)
Common attack techniques12m 5s
-
(Locked)
Automating vulnerability scans3m 35s
-
(Locked)
Credential attacks14m 31s
-
(Locked)
Labtainers lab: Password cracking2m 23s
-
(Locked)
Labtainers lab: Secure Sockets Layer2m 30s
-
(Locked)
Labtainers lab: Routing basics1m 37s
-
-
-
-
-
-
-
-
-
-
-