Jerod provides a quick demo of Wireshark. In this demo, he shows you how to access the tool, and he configures a virtual machine on a host-only network to communicate so that you can see what it looks like when Wireshark captures network traffic. In this demo, Jerod again discusses the difference between different types of Wireshark filters.
- [Instructor] In my demo environment…I've configured two virtual machines on a host-only network…just to show you some very basic functionality of Wireshark.…The first virtual machine is Kali-Linux…and the second virtual machine is Windows 10 instance…from developer.microsoft.com.…So let's open Wireshark and monitor some traffic…between these two systems.…Go to Applications, and under number nine,…Sniffing and Spoofing,…you'll see Wireshark at the very bottom of the list.…
Click on that.…Here's that error message I told you about earlier.…Again, we have too many privileges…because Kali runs under root.…But that's okay.…Just click the OK button.…And eth0 is our default network adaptor.…This is the one we're going to capture from.…In the upper left hand corner, the blue fin is a shortcut…for capturing packets in Wireshark.…Click on that.…
Now again, on a host-only network…we're not going to have a lot of traffic.…Just some basic back and forth between these two.…But let's got the Windows system.…Open a command prompt.…
Note: This course aligns with the National Institute of Standards and Technology (NIST) special publication on information security testing (SP 800-115).
- Identifying the five major types of security assessments
- Defining the security assessment life cycle
- Setting up your testing environment
- Planning a security assessment
- Reviewing documentation, logs, and more
- Identifying test targets
- Testing for password and other security vulnerabilities
- Drafting and delivering your report
Skill Level Beginner
Security Testing: Nmap Security Scanningwith Mike Chapple1h 46m Intermediate
Troubleshooting Your Network with Wiresharkwith Lisa Bock2h 35m Intermediate
DevSecOps: Automated Security Testingwith James Wickett1h 35m Intermediate
What you should know1m 49s
1. Understanding Security Assessments
2. Your Testing Environment
3. Planning Your Assessment
4. Review Techniques
5. Identifying Your Targets
6. Vulnerability Validation
7. Additional Considerations
Next steps3m 39s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.