From the course: Wireshark: Malware and Forensics
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
Tap into your network - Wireshark Tutorial
From the course: Wireshark: Malware and Forensics
Tap into your network
- [Narrator] Tapping into the data stream, and what you will see, will depend on the network architecture. As we see in this complex graphic, we can tap in in many areas of the network. Wireless 802.11 acts like a hub, which will allow you to see all of the traffic. If tapping into a wired network, you will most likely tap into a switch, and you will see only your own traffic. In order to see traffic destined to a specific device, network administrators use port mirroring, or SPAN, which is switched port analysis. For example, you can mirror the traffic going to a server back to your laptop for analysis. You can also use a full-duplex tap in line with traffic. You will most likely need a special adapter. There are various options to select before beginning a capture, including selecting the interface, output choices, and capture options. When you're ready to tap in and capture for the first time, you're going to go up…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Exploring cyberattacks and trends5m
-
(Locked)
Understanding malware and cyber threats2m 35s
-
(Locked)
Packet analysis overview2m 59s
-
(Locked)
Outlining the benefits of Wireshark3m 25s
-
(Locked)
Using Tshark in the command line4m 52s
-
(Locked)
Tap into your network4m 40s
-
(Locked)
Create firewall rules3m 53s
-
(Locked)
Challenge: Email forensics2m 47s
-
(Locked)
Solution: Email forensics4m 43s
-
-
-
-
-