• Introduction;
• What is WireShark;
• A little about protocols, IP and OSI;
• Installing and configuring WireShark;
• Interface analysis;
• Protocol, IP, port filters;
• HTTP Packet analysis;
• Demonstration of credential theft;
• WireShark and Linux firewall;
• Detecting unauthorized traffic.
Part two:
• Command line overview;
• Command line arguments;
• Capturing traffic to a file and analyzing it;
• Limitations of file capture;
• Capture and display filters;
• Overview of network card modes;
• Monitoring mode;
• Deciphering captured traffic;
• Formatting output to a cls file.
Part three:
• Extracting real information (Video, photos, etc.);
• WireShark and Nmap, types of scanning and amount of traffic;
• Stealth scanning;
• SSH tunneling. Capturing traffic over the Internet. Introduction;
• Setting up a remote machine. Setting up SSH;
• TCPdum installation and configuration of capture;
• Capturing traffic from a remote host;
• Installing the server, admin panel and client;
• Necessary software and OS;
• Installing operating systems;
• Installing guest additions, establishing an SSH connection with the server;
• Configuring a firewall to pass traffic;
• Capturing traffic from the client machine;
• Denying access to certain resources.