"tcpdump video with the - d. i can choose any of the interfaces and it ’ ll pop up and it ’ ll say, “ hey you need to be running this as root. ” so what i ’ m going to do is do sudo wireshark and it ’ s going to ask me for my password. so alright, when we first get into wireshark …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1040Network Sniffing
97%
"getting started with wireshark getting started with wireshark hello and welcome, my name is john strand and in this video, we ’ re going to be getting started with wireshark. now, wireshark is very similar to tcpdump, in fact, a lot of people actually prefer wireshark to tcpdump,…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1040Network Sniffing
85%
", it really helps to kind of step back and say okay who ’ s talking with whom and then drill down to the specific ip address or ip addresses that you ’ re looking forward to talking to as well. finally, you can do statistics and you can actually look at the http conversations as …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1040Network Sniffing
83%
"backdoor. i ’ m going to continue without saving. now, this is actually a packet capture from a compromised computer system and this will give me the ability to dig in a little bit on some of the cool things that i can do with wireshark. so, if i can take any one of these packets…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1040Network Sniffing
78%
"capture file that i have here as well. other things i can do is i can look at statistics and i can actually look at the conversations, how much data is being sent in between these different ip addresses. so, what ’ s the address a, what ’ s the port that ’ s being used and who is…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1095Non-Application Layer Protocol
75%
"packets, it ’ s going to break down the actual hexadecimal decode here or the hacks and if you highlight over certain sections and click on the sections within the hacks, it ’ s going to decode what that is in the middle window. so let ’ s go ahead and zoom in on that just a litt…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1040Network Sniffing
73%
"packets, it ’ s going to break down the actual hexadecimal decode here or the hacks and if you highlight over certain sections and click on the sections within the hacks, it ’ s going to decode what that is in the middle window. so let ’ s go ahead and zoom in on that just a litt…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1040Network Sniffing
45%
"such a way that it ’ s easy for me to understand what ’ s going on. now, this is clear text http, if it ’ s encrypted you ’ re going to see the encrypted data. but you can see that what was being sent between these two systems in this http request, was a get request with our actu…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Hello and welcome, my name is John Strand and in this video, we’re going to be getting started with Wireshark. Now, Wireshark is very similar to TCPDump, in fact, a […]