Skip to main content

Posts

Showing posts with the label Packet Sniffing

Fun With Wireshark: Packet Analysis and Ethical Hacking Part 3: Troubleshooting

Here is the part you want to see - Troubleshooting! Question: Do trunks form between SW1 / SW2 and SW2 / S3? Remember: VLAN trunks are the highway that every bit of information can pass upon, no matter what VLAN it came from. When the VLAN frame gets closer to its destination, it will travel on roads only avaliable for that VLAN. The packets for SW1/2 so far show DTP and PAgP. Now, PAgP is Cisco-proprietary Etherchannel, but DTP is for trunking negotiation between switches. Wait!

Fun With Wireshark: Packet Analysis and Ethical Hacking Part 2

This section covers hacking! Remember: I'm taking only a sliver of the information presented to give employers a better idea of what I know and am capable of learning, not copying someone's course word from word. You know why we don't use Telnet anymore? Because of this. This is in clear text.

Fun With Wireshark: Packet Analysis and Ethical Hacking Part 1

This is David Bombal's course on Udemy . Screenshots will be scarcer because, hey, you didn't pay for this. I did. This covers the first 4 sections (Sans the OSI model): Introduction Setting Up Using Filters Setting Up: 

Fun With Wireshark: Introduction!

I haven't used Wireshark in quite some time, so now I had a bit of a re-affilation curve to deal with. How do I know if I'm capturing from my Eth0 interface? So I pulled up my Network Utility and told it, "Hey, ping my website until I tell you stop."