From the course: Offensive Penetration Testing
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Wireshark and Encrypted Traffic
From the course: Offensive Penetration Testing
Wireshark and Encrypted Traffic
Wireshark and Encrypted Traffic. We only have one learning objective here, and that's to understand the difference between encrypted traffic and unencrypted traffic when using Wireshark or while using Wireshark. So why is this important? Well, as an attacker, we want to know, again, what our tools do. And if I'm using Netcat in a Pentest and I am exfiltrating data, I'm doing everything in the clear. A defender can see exactly what data I'm exfiltrating, which, of course, is bad. So it's important to know what our tools do. And a tool that's like Netcat is Socat. So in the new PWK material that came out last year, they are now introducing the Socat. Socat has been out longer of course than that But the tool is like Netcat, is a bit more versatile and it's a little bit harder to learn how to use. Now, we can see here I'm creating a reverse shell on Port 22 from my Windows box, connecting to my Kali box. And here's the syntax. Again, not as easy to learn as Netcat. So if we look at our…
Contents
-
-
-
-
-
Scanning network protocols4m 53s
-
(Locked)
Scanning with Nmap8m 1s
-
(Locked)
Scanning with MASSCAN6m 53s
-
(Locked)
Scanning with Netcat9m 53s
-
(Locked)
Using Wireshark5m 25s
-
(Locked)
Wireshark and Encrypted Traffic4m 57s
-
(Locked)
Weaponizing Wireshark6m
-
(Locked)
SMB enumeration6m 33s
-
(Locked)
SMB enumeration demo11m 19s
-
(Locked)
NFS enumeration7m
-
(Locked)
SMTP enumeration5m 17s
-
(Locked)
SNMP enumeration5m 42s
-
(Locked)
FTP enumeration3m 53s
-
(Locked)
FTP enumeration demo6m 36s
-
(Locked)
SSH enumeration12m 25s
-
(Locked)
Protocol tips6m 50s
-
(Locked)
Network Protocols Lab1m 17s
-
-
-
-
-
-
-
-
-