Join Lisa Bock for an in-depth discussion in this video Solution: HTTP packets, part of Wireshark: Malware and Forensics.
- [Narrator] Now let's do this challenge together.…I'm at cloudshark.org, where here…we can see http.cap.…First I'll go over to export and download the file.…I'll want to export a new pcap…next generation with CloudShark,…and then open it with WireShark.…Here we can see the packet capture.…I'll apply a display filter, http,…and here I see two packets displayed.…
I'll then file and export specified packets…and save on my desktop in the captures file http.…We'll default at pcap next generation and save.…Now I'll go to file and export objects http.…There I see a single image.…I'll say save as,…logo.eng, and save.…
Now I'll go get the image.…Here we can see the single image that was in the capture.…
- Trends in cyberattacks
- Preventing system compromise
- Analyzing packets
- Using Wireshark
- Creating firewall rules
- Baselining a network
- Using capture filters
- Using a ring buffer
- Handling OSI layer attacks
- Identifying attack signatures
- Using VirusTotal
- Handling unwanted TOR activity
Skill Level Intermediate
Troubleshooting Your Network with Wiresharkwith Lisa Bock2h 35m Intermediate
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Appropriate for all
1. Deep Packet Analysis
2. Capture Overview
3. Unusual Traffic
4. Case Studies
Next steps1m 30s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.