Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Ethical Hacking: Network Security & Network Layer Attack
Network Fundamentals
Course Introduction and What the Course is? (1:15)
Reference Models
What is “Protocol” (5:36)
Reference Models (0:24)
OSI Reference Model (13:43)
OSI vs TCP/IP (2:32)
Demonstration using Wireshark (7:59)
Data Link Layer ( Layer 2 )
Standards & Protocols (3:50)
Ethernet: Principles, Frame & Headers (4:06)
ARP ( Address Resolution Protocol ) : Mechanism, ARP Tables, ARP Packets (6:10)
ARP Hand-On Practices (3:14)
VLANs – Virtual Local Area Networks (4:03)
WLANs – Wireless Local Area Networks (7:01)
Network Layer ( Layer 3 )
Introduction to Network Layer (1:36)
Internet Protocol - IP (2:49)
IPv4 Adressing System (1:56)
IPv4 Packet Header (2:56)
IPv4 Subnetting: Classful Networks (2:35)
IPv4 Subnetting: Subnet Mask (2:59)
IPv4 Subnetting: Understanding (3:09)
IPv4 Shortage (1:41)
Private Networks (3:59)
Private Networks - Demonstration (3:01)
NAT – Network Address Translation (4:30)
IPv6, Packet Header & Addressing (8:30)
DHCP - How the Mechanism Works (9:23)
ICMP – Internet Control Message Protocol (2:02)
Traceroute (9:50)
Transport Layer ( Layer 4 )
Introduction to Transport Layer (2:39)
TCP – Transmission Control Protocol (6:59)
TCP Header (2:27)
UDP – User Datagram Protocol (3:56)
Application Layer (Layer 5-7)
Introduction to Application Layer (0:55)
DNS – Domain Name System (5:56)
HTTP ( Hyper Text Transfer Protocol ) (3:09)
HTTPS (1:56)
Checklist - What We Have Learned (1:26)
Network & Data Link Layer (Layer 2) Attacks
What is Covered? (1:15)
Create Lab VmWare
Download and Install Kali Linux -VirtualBox (7:36)
Download and Install VirtualBOX (2:03)
Download and Install Kali Linux Image File (2:40)
Download and add Metasploitable Image File (2:40)
OWASP Image File-2 Download and Add VirtualBOX (4:21)
Why We Still Use Windows 7 & 8
Windows 7 & 8 Download For Mac Users
Windows 7 Add VirtualBox (1:47)
Windows 8 Add VirtualBox (1:52)
Windows XP Add VirtualBox (1:51)
Create Nat Network and Connections Test with VirtualBox (7:32)
Create Lab VmWare
Kali Linux Install VMWare (5:39)
VmWare Download and Install (1:55)
Kali Image File Add VmWare (2:02)
Metasploitable Add VmWare (2:15)
Owasp Add VmWare (2:12)
Win7 add VmWare (1:59)
Win8 add VmWare (1:51)
WindowsXp Add VmWare (2:00)
Create Nat Network and Connections Test with VmWare (6:12)
Using GNS3 and Creating a GNS3 Networks
Download & Install (3:30)
Setting Up the First Project (7:57)
GNS3 Environment (2:56)
Building GNS3 Network (15:45)
Attach Kali (or another VM) to the GNS3 Network (6:31)
Configuring Switch & Router (Cisco) and creating VLANs (5:14)
Network Sniffing: The “Man in the Middle” (MitM)
MitM: Listening to the traffic (1:45)
Sniffing (1:03)
TCPDump (5:23)
Wireshark: Capturing the Traffic (8:34)
Wireshark: Following Stream (2:40)
Wireshark: Summarise Network (6:19)
Active Network Devices
Router, Switch, Hub (4:44)
Expanding Sniffing Space
How to Expand Sniffing Space? (5:13)
MAC Flood: Switching (3:55)
MAC Flood: Using Macof Tool (7:09)
MacFlood - Countermeasures (1:13)
ARP Spoof (3:40)
ARP Cache Poisoning using Ettercap (10:35)
DHCP Starvation & DHCP Spoofing (3:36)
DHCP Mechanism (6:15)
DHCP Starvation - Scenario (3:59)
DHCP Starvation Demonstration with Yersinia (8:33)
VLAN Hopping (2:04)
VLAN Hopping: Switch Spoofing (1:39)
VLAN Hopping: Double Tagging (3:17)
Penetration Testing of Network Devices
Reconnaissance: Finding Open Ports & Services Using NMAP (5:15)
Password Cracking (2:06)
Online SSH Password Cracking Using Hydra (7:58)
Compromising SNMP: What is SNMP ? (5:44)
Compromising SNMP: Finding Community Names Using NMAP Scripts (3:06)
Compromising SNMP: Write Access Check Using SNMP-Check Tool (2:18)
Compromising SNMP: Grabbing SNMP Configuration Using Metasploit (5:53)
Weaknesses of network devices (3:15)
Auditing Network Devices
Password Creation Methods of Cisco Routers (7:49)
Identity Management (0:52)
ACL – Access Control Lists (5:12)
SNMP Security (4:15)
ARP ( Address Resolution Protocol ) : Mechanism, ARP Tables, ARP Packets
Complete and Continue