Description: In Part-1 of the Wireshark Basics video, we looked at how to capture traffic in promiscuous mode, apply display filters for ICMP, TCP etc. In Part-2 we will look at how to reverse engineer network applications using Wireshark. As an example we will fire up a port scanning exercise using the Nmap utility and try and understand how it scans ports by looking at the network traffic dump using Wireshark. This video will be useful to anyone who desires to understand the workings of a port scanning utility or wants to know how to reverse engineer a network application's workings. Links:<br><br>1. Wireshark Basics<br><br>2. Packet Sniffing using TcpDump<br><br>3. Raw Sockets Basics<br><br>4. Packet Sniffing Programming Basics<br><br>
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
thanks
nice