Skip to main content

Video Tutorials


Wireshark Network Forensics and Security Video Trainings With Tools




Wireshark Network Forensics and Security Video Trainings With Tools | 1.95GB

Description:

This course focuses on network forensics including capture locations, stealth-mode capture,optimal capture and display filters, validating encrypted logins, identifying reconnaissance processes, locating header and payload signatures, catching penetration tests, malware behavior, backdoor communications and virus traffic.

Recommended prerequisite knowledge:

  • Basic security knowledge (resources, viruses, worms, denial of service)
  • Basic and advanced network components (hubs, switches, routers, firewalls, IDS)
  • Very strong knowledge of Wireshark functionality and features
  • Navigation
  • Capture filters and methods
  • Packet details (TCP/IP protocols and applications)
  • Display filtering on protocol or field or bit value
  • Search by display filter, hex value or string
  • Basic Wireshark graphs and tables (IO, conversations, endpoints)
  • Advanced Wireshark graphs (CALC, SEQ/ACK, RTT)
  • Save packets based on filters, markers or range value
  • Very strong knowledge of TCP/IP protocol and application functionality
  • Port usage and resolution
  • Name resolution (network and hardware address) and route resolution
  • ICMP functionality (packet structure, functionality)
  • TCP functionality (handshake, fault tolerance, recovery)
  • DNS functionality (address lookup, errors)
  • IP functionality (addressing, fragmentation)
  • ARP functionality (structure, functionality)
  • Follow TCP Streams
  • Expert Info/Expert Info Composite interpretation




Tools Kit:

-bittwist
-cain_abel
-commview
-comm_traffic
-essential_nettools
-ettercap
-ftk_imager
-kfsensor
-netresident
-netscantools_pro
-nmap
-wireshark

Trace Files Included:

Quote:
137port.pcap
2-specters-fighting.pcap
active-scan.pcap
aida32-connection.pcap
anotherlousyhotelnetwork.pcap
arp-bad padding.cap
arp-bootup.pcap
arp-ping.pcap
arp-poison.pcap
arp-recon.pcap
bit-torrent-startup-background.pcap
bittorrent-idle-crap.pcap
bittorrent-launch-search-maddona.pcap
blaster.pcap
chargen.pcap
clientdying.cap
clientdying.pcap
dhcp-ack-info.pcap
dhcp-discover-strange.pcap
dhcp-offer-info.pcap
dhcp-relay-serverside.pcap
dhcp-renewtorebind.pcap
dhcp-server-slow.pcap
dhcpjerktakesaddressnopermission.pcap
dhcp_server_discovery-2_types.pcap
dictionary.pcap
dictionary2.pcap
dns-error-domain.pcap
dns-misc.pcap
dns-misc2.pcap
dns-mxlookup.pcap
dns-ptr.pcap
dns-root.pcap
dns-serverfailure.pcap
dns-slow.pcap
dns-ttl-issue.pcap
dnswalk.pcap
download-bad-to-good.pcap
download-bad.cap
download-bad.pcap
download-good.pcap
espn-moved.pcap
ettercap-checkforpoisoner.pcap
evilprogram.pcap
fin-unhappy-client.pcap
frag-needed.pcap
ftp-crack.pcap
ftp-download-good2.pcap
ftp-failedupload.pcap
ftp-filesizeproblem.pcap
.
.
.and more
Wireshark Network Video trainings include:
Quote:
  1. 0106-IO_Graphing.avi
  2. 0106-IO_Graphing.mp3
  3. 0106-IO_Graphing_iPod.m4v
  4. 0107-Flowgraph.avi
  5. 0107-Flowgraph.mp3
  6. 0107-Flowgraph_iPod.m4v
  7. 0206-SEQ_ACK_Analysis.avi
  8. 0206-SEQ_ACK_Analysis.mp3
  9. 0206-SEQ_ACK_Analysis_iPod.m4v
  10. 0208_dhcp.wmv
  11. 0208_dhcp_iPod.m4v
  12. 0306-TCP_Window.avi
  13. 0306-TCP_Window.mp3
  14. 0306-TCP_Window_iPod.m4v
  15. 0308_tcpconloss.wmv
  16. 0308_tcpconloss_iPod.m4v
  17. 0406-Signatures.avi
  18. 0406-Signatures.mp3
  19. 0406-Signatures_iPod.m4v
  20. 0506-Whois.avi
  21. 0506-Whois.mp3
  22. 0506-Whois_iPod.m4v
  23. 0606-Recon_Co_Person.avi
  24. 0606-Recon_Co_Person.mp3
  25. 0606-Recon_Co_Person_iPod.m4v
  26. 07-11-icmpredirect.wmv
  27. 07-11-icmpredirect_iPod.m4v
  28. 0706-Email_Recon.avi
  29. 0706-Email_Recon.mp3
  30. 0706-Email_Recon_iPod.m4v
  31. 0806-MITM.avi
  32. 0806-MITM.mp3
  33. 0806-MITM_iPod.m4v
  34. 0906-Wireshark_Flood.avi
  35. 0906-Wireshark_Flood.mp3
  36. 0906-Wireshark_Flood_iPod.m4v
  37. 0907-padding.wmv
  38. 0907-padding_iPod.m4v
  39. 1006-Snort_Rules1.avi
  40. 1006-Snort_Rules1.mp3
  41. 1006-Snort_Rules1_iPod.m4v
  42. 1106-Snort_Rules2.avi
  43. 1106-Snort_Rules2.mp3
  44. 1106-Snort_Rules2_iPod.m4v
  45. 1206-IDS-Import.avi
  46. 1206-IDS-Import.mp3
  47. 1206-IDS-Import_iPod.m4v
  48. aug07-reassembly.wmv
  49. aug07-reassembly_iPod.m4v
  50. jan08_dns.wmv
  51. jan08_dns_iPod.m4v
  52. jul07-macnames.wmv
  53. jul07-macnames_iPod.m4v
  54. jun07-aclrules.wmv
  55. jun07-aclrules_iPod.m4v
  56. oct07-ioadvanced.wmv
  57. oct07-ioadvanced_iPod.m4v
  58. WSU01-7_iPod.m4v
  59. WSU0107-Advanced_Statistics.wmv
  60. WSU02-10-telnet.wmv
  61. WSU02-10_telnet_sample_iPod.m4v
  62. WSU03-S4.wmv
  63. WSU0405-TCP_Security.wmv




http://www.filesonic.com/file/843856291/9kcl.part01.rar
http://www.filesonic.com/file/835449631/9kcl.part02.rar
http://www.filesonic.com/file/835912661/9kcl.part03.rar
http://www.filesonic.com/file/836491441/9kcl.part04.rar
http://www.filesonic.com/file/836964891/9kcl.part05.rar
http://www.filesonic.com/file/837466401/9kcl.part06.rar
http://www.filesonic.com/file/841678821/9kcl.part07.rar
http://www.filesonic.com/file/841977721/9kcl.part08.rar
http://www.filesonic.com/file/842564281/9kcl.part09.rar
http://www.filesonic.com/file/842774231/9kcl.part10.rar

Feel Free To Ask if You Have Any Difficulty.
If links are dead it is requested to directly reply as well as pm me so that the links may be re-up.


Comments

Popular posts from this blog

Defacing Sites via HTML Injections (XSS)

Defacing Sites via HTML Injections Defacing Sites via HTML Injections What Is HTML Injection: "HTML Injection" is called as the Virtual Defacement Technique and also known as the "XSS" Cross Site Scripting. It is a very common vulnerability found when searched for most of the domains. This kind of a Vulnerability allows an "Attacker" to Inject some code into the applications affected in order to bypass access to the "Website" or to Infect any particular Page in that "Website". HTML injections = Cross Site Scripting, It is a Security Vulnerability in most of the sites, that allows an Attacker to Inject HTML Code into the Web Pages that are viewed by other users. XSS Attacks are essentially code injection attacks into the various interpreters in the browser. These attacks can be carried out using HTML, JavaScript, VBScript, ActiveX, Flash and other clinet side Languages. Well crafted Malicious Code can even hep the ...

EKS Cluster and Create CSI Driver to store credentials in AWS Secrets Manager via SecretProviderClass

EKS Cluster | CSI Driver | SecretProviderClass | AWS Secrets Manager Setup EKS Cluster and Manage Credentials at runtime using CSI driver using SecretProviderClass and Secrets Manager Assuming you have Configured/Installed AWS CLI, EKSCTL, KUBECTL, HELM. CSI Basic Information: CSI (Container Storage Interface) widely used as a Storage Technology. Created by Google | Mesosphere | Docker.  It has two two Plugins one runs on the Master Node (Centralized Controller Plugin) and another one on Worker Nodes (Decentralized headless Node Plugin).  CSI communication protocol is gRPC.   The communication between Container Orchestration to Controller Plugin (Master) and to Node Plugin (Worker Node) happens using gRPC .  CSI Drivers : vendor specific compiled into Kubernetes/openshift binaries. To use a CSI driver, a StorageClass needs to be assigned first.  The CSI driver is then set as the Provisioner for the Storage Class. CSI drivers provide three main service...

Linux Systems Performance/Observability (BPF (bpfcc-tools), BCC Tools

  Linux System Performance/Observability Tools Linux Systems Performance/Observability (BPF (bpfcc-tools), BCC Tools Assuming you have Linux Server in place and have the required BPF aka BCC related packages installed on the system(s) for the required Linux distribution. BPF(eBPF) aka BCC Tools (bpfcc-tools) : BPF, which originally stood for Berkley Packet Filter is the dynamic tracing tools for Linux Systems.  BPF initially used for the speeding up for the tcpdump expressions and since then it has been know as the extended Berkley packet Filter (eBPF).  Its new uses are Tracing Tools where it provides programmability for the BPF Compiler Collection (BCC) and bpftrace front ends .   Example: execsnoop, biosnoop etc is a BCC Tool. When facing production performance crisis these such list of tools comes handy to trace and fix the issue. However, it requires certain KERNEL level config options to be enabled such as CONFIG_FTRACE, CONFIG_BPF. Profiling tools typically re...