Wireshark is the world's foremost network protocol analyzer. It lets you see what's happening on your network at a microscopic level. It is the de facto (and often de jure) standard across many industries and educational institutions.
Perform analysis more efficient
Wireshark has many features that simplify your analysis. Do you know what you can achieve by using different profiles in Wireshark? You will be able to adjust the tool for different situations.
Discover hidden features in Wireshark
Many valuable features are quite hidden. You will see how you add comments for documentation purposes or how you limit the file size of your trace without loosing relevant data.
The course will not cover installation and first steps with Wireshark and it also does not contain details about protocol analysis. It is suited for anybody with basic knowledge of Wireshark and even experts may discover a few tricks.
Wireshark is the most important tool and the part of the weapon list of every infosec professional. Wireshark plays an important role during the penetration testing process and even hackers use it to sniff the confidential data. But, have you ever tried using the advance features of Wireshark? Do you really know what Wireshark is able to do? Or do you know what you can achieve using Wireshark? And, how you can effectively use Wireshark to achieve your pentesting objectives?
Don’t you know the answers? Well, this is why we have launched this course, it unearths the advanced features of Wireshark, it is a short crash course that focuses on how you can get the maximum value of using Wireshark during the penetration testing. This course does not teaches the installation process, but it teaches the features that are important and that you should consider.
This course also helps to achieve the Wireshark certifications, for example, WCNA (Wireshark certified Network Analyst).
The configuration settings are stored in files. Learn what can be found in which file and which files you need to create yourself.
Define human readable names for MAC and IP addresses.
Configure the time format according to your needs.
If there are too many packets you can simply ignore irrelevant ones.
Export specific packets to have smaller traces without overhead.
Add comments to files and packets for documentation.
Filter at capture and during analysis. Understand the differences between capture filters and display filters.
See different methods to efficiently capture packets and have traces with reasonable file size.
Finding faults is one of my "hobbies"; with a broad background on networking technologies and experience in development, testing and analysis and a good intuition finding anomalies becomes simple. To share this know-how in various courses is as important as applying it on different types of analysis. A master in electrical engineering and many years in the telecommunication industry provide the technical background.