Network Sniffing: Using Wireshark to Find Network Vulnerabilities

แชร์
ฝัง
  • เผยแพร่เมื่อ 2 ต.ค. 2024
  • Sniffers are certainly nothing new, but can they be used to discover serious misconfigurations in our networks? Yes!
    In this episode we look at how to use a sniffer in an easy, repeatable process to find unusual, unauthorized and just plain insecure protocols on our networks quickly and easily! For more information, check out auditcasts.com

ความคิดเห็น • 86

  • @meyerjohannes
    @meyerjohannes 8 ปีที่แล้ว +31

    Am I the only one noticing the pornography bookmark?
    Nice vid though.

    • @DHAtEnclaveForensics
      @DHAtEnclaveForensics  8 ปีที่แล้ว +10

      +Johannes Meyer It's actually not.. It's a link to a forensic resource for electronic signatures of known illegal pornographic images. It's a dataset that we can use to quickly identify if there's known-bad stuff that would require law enforcement involvement in a case.
      You did make me go look at my backups, though! :)

    • @meyerjohannes
      @meyerjohannes 8 ปีที่แล้ว

      Heh, I actually assumed that's what it was. Is that related to Microsoft's deep packet inspection for child pornogrophy? I remember reading something about that some years ago.

    • @DHAtEnclaveForensics
      @DHAtEnclaveForensics  8 ปีที่แล้ว +5

      Nope, just part of my forensic business. :)

    • @yahyaibniliyas
      @yahyaibniliyas 6 ปีที่แล้ว

      lol i can see that too

    • @James-ys7ym
      @James-ys7ym 6 ปีที่แล้ว

      lol That's hilarious!

  • @isaakjananel3935
    @isaakjananel3935 11 ปีที่แล้ว

    Great video David, can you recommend other video to learn more about Wireshark. I'am a beginner using Wireshark. Thank you

  • @deidara_8598
    @deidara_8598 4 ปีที่แล้ว +2

    All I can say is that the methodical approach demonstrated in this video has come in real handy and I can't thank you enough for making this video. Super educational!

  • @tf6385
    @tf6385 2 ปีที่แล้ว

    14:30 - 22.08.2022 - Network Sniffing: Using Wireshark to Find Network Vulnerabilities, 307,398 views - Aug 30, 2011.
    David Hoelzer - 5.87K subscribers.

  • @harness84_29
    @harness84_29 4 ปีที่แล้ว

    so this is to scann your own network? but how do I scan someone else's network?

  • @KathDX
    @KathDX 10 ปีที่แล้ว +1

    Thank you for this thoughtful tutorial it does help me to understand wireshark better. You helped to short-cut.. tx again triple thumbsup.

  • @travblog
    @travblog 10 ปีที่แล้ว

    I am a student starting my computer networking degree . Could you please suggest me how can learn more about network security ,pen testing etc .. any certifications?..am from UK

  • @xLatinAssazzin
    @xLatinAssazzin ปีที่แล้ว

    Thank you so much for making our days better with your videos!

  • @ryanp171282
    @ryanp171282 9 ปีที่แล้ว

    Do you know a way to detect network loops easily in a large network? RSTP us enable so helping but I need to find the loop without running around.

  • @Akira29H
    @Akira29H 9 ปีที่แล้ว

    Can Wireshark able to trace the machine that trigger viruses or the origin source where /which email of the user come?if not can you provide me how to trace it?

  • @bfunkydunk
    @bfunkydunk 4 ปีที่แล้ว

    That was a good video on breaking down network traffic to get to a problem.

  • @JoeJoseph79
    @JoeJoseph79 9 ปีที่แล้ว

    Can i scan websites from another network.Please help im a noob.

  • @randystauber5998
    @randystauber5998 9 ปีที่แล้ว

    Great video.
    I can't seem to find anything to backup that a WINS server will eliminate NBNS broadcast. You got any documentation for that?

    • @kestutissnieska
      @kestutissnieska 7 ปีที่แล้ว

      support.microsoft.com/EN-US/help/119493

  • @rahulchawla6696
    @rahulchawla6696 6 ปีที่แล้ว

    from this all, how we will be able to find the vulnerabilities in the network. ??

  • @TofuCakeCan
    @TofuCakeCan 11 ปีที่แล้ว

    You can run Wireshark in promiscuous mode, and it will show you all the traffic that is being broadcasted. However you still must have access to the network for this to work (so you can't automatically sniff a secured network) and if you're on a switched network, you'll only receive traffic bound for your system.

  • @chrisgast
    @chrisgast 4 ปีที่แล้ว

    Thanks for the help on network vulnerabilities.

  • @acklan3
    @acklan3 10 ปีที่แล้ว

    Can Wire Shark be configured to trigger event(s) and send notifications (email, text,..) while streaming real time and safe the stream to a hard drive for later analysis?

    • @DHAtEnclaveForensics
      @DHAtEnclaveForensics  10 ปีที่แล้ว +2

      No. However, you should take a look at Snort. (snort.org) Snort will allow you to do what you are asking.

  • @BetterDayzMusic
    @BetterDayzMusic 4 ปีที่แล้ว

    Hiii, thanks for another great tutorial. Please, I have a question. Does Wireshark capture any wireless traffic such as wifi, or cellular? Thanks in advance!

    • @BetterDayzMusic
      @BetterDayzMusic 4 ปีที่แล้ว

      Juan Juan why did you respond like this???

    • @BetterDayzMusic
      @BetterDayzMusic 4 ปีที่แล้ว

      The reason why I ask is whether it’s even necessary to be able to snif wifi, if you can already sniff packets going through my home router. I guess I need to educate myself more on the whole process. I just want to know if anyone’s using my wifi.

  • @earnestredwood4694
    @earnestredwood4694 10 ปีที่แล้ว

    I just want to take this time to thank you for explaining how wiresharke works

  • @learnpceasy9186
    @learnpceasy9186 9 ปีที่แล้ว

    When would a span or mirror be necessary?

  • @jamesdepaul3410
    @jamesdepaul3410 3 ปีที่แล้ว

    Very educational. Thank you

  • @opusm3
    @opusm3 13 ปีที่แล้ว

    As an alternate you might find Fluke Networks ClearSight Analyzer easier to use.

  • @MalMilligan
    @MalMilligan 9 ปีที่แล้ว

    A few years old now but still very relevant. Nicely done.

  • @MrKareem722
    @MrKareem722 11 ปีที่แล้ว

    you mean to set your self as the hdcp server for the host router ? is it like that ?

  • @hotlips3923
    @hotlips3923 6 ปีที่แล้ว

    All I want to know...is where they are!

  • @Princewmk
    @Princewmk 10 ปีที่แล้ว

    hey david am trying to sort out my ethical hacking assignment and I am just about to write my recon phase and I am a bit confused on what tool i can use in the recon phase to show a figured example... can you hepl?

    • @DHAtEnclaveForensics
      @DHAtEnclaveForensics  10 ปีที่แล้ว

      What do you mean, "a figured example?" And, generally, I don't do anything with CEH... Like many in the field I don't find CEH particularly useful... GCIH or GPWN, however...

    • @Princewmk
      @Princewmk 10 ปีที่แล้ว

      David Hoelzer i mean i would like to use a tool or software in the recon phase and use screenshot figures of the tool to show an example in my assignment.
      what i need is what tool would you recommend during passive recon and what do you recommend during active recon. thanks

    • @DHAtEnclaveForensics
      @DHAtEnclaveForensics  10 ปีที่แล้ว +2

      Well, Wireshark is a great passive recon tool. The classic active recon tool is NMap. Unless you're trying to be creative, why not just use those?

    • @Princewmk
      @Princewmk 10 ปีที่แล้ว

      David Hoelzer brilliant idea David thank you.

  • @emirradoncic
    @emirradoncic 12 ปีที่แล้ว

    i can't find any password...can you help me ?

  • @ScottBrown124
    @ScottBrown124 11 ปีที่แล้ว

    ARP Poison the shit out of that network then

  • @rlyen1969
    @rlyen1969 10 ปีที่แล้ว

    Very good tutorial, thank you for sharing!

  • @maosalas9232
    @maosalas9232 8 ปีที่แล้ว

    Very nice explained. Thanks!

  • @eddeig
    @eddeig 10 ปีที่แล้ว

    Great video. Many Thanks!!!

  • @SeiferAlmasy21
    @SeiferAlmasy21 9 ปีที่แล้ว

    Great video! nice voice to listen at.

  • @shaunfielding9123
    @shaunfielding9123 11 ปีที่แล้ว

    Thank you for this. Good work, makes Wireshark more valuable.

  • @gbak012001
    @gbak012001 10 ปีที่แล้ว

    thanks was a big help

  • @Tips4Tat
    @Tips4Tat 8 ปีที่แล้ว +1

    EXCELLENT!!

  • @TheRealLovetycoonzX
    @TheRealLovetycoonzX 10 ปีที่แล้ว

    I'm new to Cain and Abel. Is there a way to brute-force an internet password? Like TH-cam?

    • @DHAtEnclaveForensics
      @DHAtEnclaveForensics  10 ปีที่แล้ว

      Not with cain and abel.

    • @TheRealLovetycoonzX
      @TheRealLovetycoonzX 10 ปีที่แล้ว

      Is there a program we can do that with?

    • @TheRealLovetycoonzX
      @TheRealLovetycoonzX 10 ปีที่แล้ว

      I need to recover a password of mine.

    • @DHAtEnclaveForensics
      @DHAtEnclaveForensics  10 ปีที่แล้ว +5

      ;) If it's your own password use the password recovery features. I'm really not in the habit of helping people break into other people's stuff. :)

    • @TheRealLovetycoonzX
      @TheRealLovetycoonzX 10 ปีที่แล้ว

      I tried all I could but I can't remember any of my passes :(

  • @Igmont
    @Igmont 11 ปีที่แล้ว

    Good and easy to follow video David.

  • @winstonchurchill8300
    @winstonchurchill8300 10 ปีที่แล้ว

    Good video. Well done!

  • @dhirupranadheer
    @dhirupranadheer 10 ปีที่แล้ว

    ty soo much

  • @theantiredneck
    @theantiredneck 12 ปีที่แล้ว

    PRTG is better!

  • @wereNeverToBeSeenAgain
    @wereNeverToBeSeenAgain 9 ปีที่แล้ว

    Yeah but... How do I find the vulns?

    • @Rightly_Divided
      @Rightly_Divided 9 ปีที่แล้ว +1

      ***** OpenVAS in Kali Linux is free and can use that. If you are planning on scanning someone else's network then get their permission, otherwise it is illegal.

  • @0xcryptofamous
    @0xcryptofamous 10 ปีที่แล้ว

    Very good intro vid! #Subbed

  • @vinayvinu6312
    @vinayvinu6312 9 ปีที่แล้ว

    :) wrkng !!

  • @SaiPavanSrirambhatla
    @SaiPavanSrirambhatla 12 ปีที่แล้ว

    Thank you Great Explanation.

  • @mickael8448
    @mickael8448 10 ปีที่แล้ว

    111 001

  • @tahersadeghi6773
    @tahersadeghi6773 ปีที่แล้ว

    Please use the arrow to point to any item you are talking about. Too many lines and not enough pointing.