Wireshark: The Art of Sniffing - Complete Crash Course

How to use the Sniffer #1 in the World in different real scenarios and get paid more! Theory & Practice + V.2 INFO!
4.5 (10 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
80 students enrolled
$50
Take This Course
  • Lectures 58
  • Contents Video: 4 hours
    Other: 7 mins
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 10/2015 English

Course Description

UPDATED: + Includes information about Wireshark version 2!
Complete Wireshark® Crash Course that will help You use the Sniffer #1 in the World in different Real Scenarios!

Dear student, in a short time you'll be able to use Wireshark® - the Sniffer #1 in the World - in many ways!

This Complete Course covers many Sniffing topics and includes a lot of practice:

  • For Ethical Hacking Beginners I'm overviewing MITM-attacks like ARP Spoofing and methods to Hide & Detect a Sniffer
  • For Beginners in Networking I'm covering the Networking basics - from the OSI model and VLANs to Port Mirroring and Passive Sniffing
  • For Network Admins there are Useful Topics which will help Troubleshoot the Network, visualize and compare the Traffic Flows and carry out Remote Capturing
  • I'll also explain to You how to make Receive-Only UTP cables and Passive Network Taps
  • If You never installed Wireshark there are Full Wireshark® Installation Tutorials
  • In this course I'm reviewing the most used classic Wireshark® (v.1) that is very stable
  • I'm also reviewing some changes in NEW Wireshark® version 2
  • There are also various Labs, Cheat Sheets & Quizzes

As I appreciate Your time, my lessons are concise and clear - You'll need only 5 minutes

At the end of this Crash Course You'll be able to capture traffic, export it in different ways, analyze frames, be aware of the varieties of options to perform Man-In-The-Middle attacks and sniff traffic invisibly, detect an active Sniffer, and even hear and analyze VoIP-calls!

You'll like it - let's begin!

What are the requirements?

  • Basic knowledge of networking like what is an IP-address
  • A computer with Windows, Linux or Mac OS X

What am I going to get from this course?

  • Use Wireshark like a champ
  • Make Receive-Only UTP cables and Passive Network Taps
  • Recover passwords from the traffic and analyze VoIP calls
  • Simulate Man-In-The-Middle attacks (MITM)
  • Understand the ins and outs of Sniffing
  • Detect sniffers in many ways
  • Use Regular Expressions
  • Decrypt Wireless traffic
  • Understand the OSI-model
  • Use Wireshark to create firewall rules
  • Securely use a remote server as a sniffer
  • Compare various traffic flows using graphs
  • Capture and Analyze the traffic using various filters
  • Extract files from the captured network traffic
  • ...and much-much more!

What is the target audience?

  • Everyone who wants to learn Wireshark & GET PROMOTED
  • CCENT/CCNA
  • Network/System Administrators
  • Beginners in Ethical Hacking who want to learn Networking aspects of Sniffing
  • The users of GNS3
  • This course is NOT about the details of traffic analysis of the specific protocols
  • This course is NOT about in-depth security and ethical hacking methods, it shows the main principles of Sniffing attacks and demonstrates their dangers as well as points out to the Mitigation techniques

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Wireshark basics
03:14
What is Wireshark and why it is the main software piece of this course
Article

Please read this before using Wireshark!

02:13

How to install Wireshark on Windows

03:08

How to fast & correctly install Wireshark on Ubuntu (or on any other Debian-based Linux).

This method also works for Raspbian.

04:16
How to install Wireshark on Mac OS X
Additional Info about the installation on OS X & Linux/Unix
Article
03:04

Quick overview of the capture process;
Basic operations - start/stop the capturing process, save the capture

05:39

Quick overview of Main Menu & more details about the Packet Capture setup

03:55

Quick overview of the Toolbars and Panes

Section 2: Networking of Sniffing: Crash Theory & Practice
05:16

The OSI model is the must-know for every system/network admin

04:23
The OSI model is the must-know for every system/network admin
07:00
Learn the difference between a Hub, a Switch and a Router
07:20

Network Conceptions that determine the "borders" of Sniffing

04:41

Learn how to mirror traffic by using a Managed Switch

05:55
Learn the difference between various sniffing types as well as "invisible sniffing" methods
Article

Secure vs. Insecure protocols - What is the difference

03:39

One of still used & popular weak protocols is Telnet.
View how it's easy to see the whole communication including passwords etc.

02:40
Learn what is a tap, what various tap types exist nowadays and make your own FastEthernet passive tap
03:00

NIC modes that break the "normal rules"

04:15

Where should one place a sniffer

Quiz
8 questions
Section 3: Sniffing attacks: Crash Theory & Practice
01:15
Various options to prepare your computer for the next labs
03:31

The fastest way to get Kali Linux up and running in the virtual environment

08:02

This attack can turn a switch into a hub

06:05
The most popular MITM-attack
02:03
The insidious Wireless MITM-attack that is very hard to detect
05:00

DHCP Starvation & DHCP Rogue Server - theory

06:23

DHCP Starvation & DHCP Rogue Server - practice

07:02

How an attacker can change the websites that a user browses

06:10

How to intercept the traffic that is to be encrypted by SSL

05:52

SSL Hijacking practice - Simulation: sniffing Facebook test-user credentials

Quiz
4 questions
Section 4: Work with Traffic
05:57
The core feature of almost every advanced sniffer that allows to turn binary data to protocol fields
07:43

How to capture only the interesting traffic. Theory and practice.

1 page

Capture Filters cheat sheet - it will help you create the right Capture Filter in Wireshark

07:18

How to display only the interesting traffic. Theory and practice.

Common mistakes in creating a Display filter
Article
1 page

Display Filters cheat sheet - it will help you create the right Display Filter in Wireshark

1 page

Regular Expressions cheat sheet - it will help you find the specified string using Display Filters

04:28

How to export data as the specified packets

05:03

How to export data as the packet dissections, specified bytes and SSL keys

05:15

Learn how to reassemble the files from HTTP and FTP

Article

Traffic samples that can help you e.g. to learn protocols etc.

Quiz
4 questions
Section 5: Wireshark Customization
07:22
Useful Wireshark info that will help you to work more efficiently
03:53

Name Resolution in Wireshark - MAC addresses & Transport protocol ports

06:10

Name Resolution on L3

06:34

Customize the coloring rules

Section 6: Wireshark version 2 vs. classic version 1
How to install Wireshark version 2 (Windows example)
02:57
Wireshark version 2 vs. version 1 : Quick Review of New Features
06:44
Section 7: Advanced topics for Admins
06:00

Useful hints that can indicate the potential network problems

02:57

One of the cool Wireshark features that allows you to instantly create additional Firewall rules

04:43

How to view traffic statistics

03:36
Visually compare different traffic types with each other
Section 8: Hide & Detect
06:35
"Classical" methods to detect a sniffer, cons and pros
06:37

Practice one of the often used "classical" detection methods &
Learn how to effectively detect a sniffer

Quiz
3 questions
Section 9: Additional Practice
05:09

Hot to carry out a remote secure capture with GUI

Additional Info about the Remote capture on various OS's
Article
05:18

Decrypt Wireless traffic using built-in Wireshark features

05:30
How to hear IP-telephony calls, visualize and analyze the whole communication
Section 10: Conclusion
01:02

Thank you!

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Timur Mezentsev, Senior Network Engineer, CCNP, CCNA & MCSA-certified

Hello everybody!                                                                                                                 

I am a Senior Network Engineer, an Information Security Specialist (KFU), CCNP- and CCNA-certified and I also hold some Microsoft certifications.

Working for several years in IT, I have realized that networking is my passion.
Networking is all about connecting people, and I would like to share my knowledge with you to create my new own network.

I speak English, German, Russian, Polish and can understand a lot of other languages, which helps me consider the issues from all sides more quickly.
In my life I have been acting as a student, as a trainer, and as a specialist in the production environment. The skills which I obtained help me make the material clear for everyone.

My style is to be concise to save your time and always to be to the point.
If you want to get a lot of things in no time, please play my preview lessons and you'll see that I'm your guy! 

Let's begin!

Timur Mezentsev

Senior Network Engineer,

CCNP-certified (Cisco Certified Network Professional),
CCNA-certified
(Cisco Certified Network Associate),
MCSA-certified (Microsoft Certified Solutions Associate WS2008).



Ready to start learning?
Take This Course