Podcast
Questions and Answers
How can we filter for port 443?
How can we filter for port 443?
tcp.port == 443
How can we be more accurate when filtering for port 443?
How can we be more accurate when filtering for port 443?
(tcp.srcport == 443 && ip.src == 64.13.134.52) || (tcp.dstport == 443 && ip.dst == 64.13.134.52)
What if we wanted to check all the responses from the target?
What if we wanted to check all the responses from the target?
ip.src == 64.13.134.52
How can we filter for open ports only?
How can we filter for open ports only?
What is a gratuitous ARP?
What is a gratuitous ARP?
How can an attacker use gratuitous ARPs?
How can an attacker use gratuitous ARPs?
What is the purpose of using gratuitous ARPs?
What is the purpose of using gratuitous ARPs?
Why is it important to know the MAC address of the target?
Why is it important to know the MAC address of the target?
What type of attack involves using gratuitous ARPs?
What type of attack involves using gratuitous ARPs?
What happens when an attacker successfully uses gratuitous ARPs?
What happens when an attacker successfully uses gratuitous ARPs?
What is the first step of attacking a network?
What is the first step of attacking a network?
What type of scan sends a SYN request to hosts and port numbers to scan for potential services?
What type of scan sends a SYN request to hosts and port numbers to scan for potential services?
How does SYN Scan determine which ports are open on a target host?
How does SYN Scan determine which ports are open on a target host?
What does a target host's response of SYN/ACK indicate during a SYN Scan?
What does a target host's response of SYN/ACK indicate during a SYN Scan?
In SYN Scan, what does a target host's response of RST indicate?
In SYN Scan, what does a target host's response of RST indicate?
How can Wireshark help in identifying which ports are open, closed, and filtered during a SYN Scan?
How can Wireshark help in identifying which ports are open, closed, and filtered during a SYN Scan?
How does session hijacking work?
How does session hijacking work?
What was the purpose of FireSheep addon?
What was the purpose of FireSheep addon?
How has the mass adoption of HTTPS impacted session hijacking?
How has the mass adoption of HTTPS impacted session hijacking?
What method can be used in a man-in-the-middle attack to intercept traffic and pretend to be the destination?
What method can be used in a man-in-the-middle attack to intercept traffic and pretend to be the destination?
What is typically encrypted when using HTTPS?
What is typically encrypted when using HTTPS?
What can be observed in Wireshark when the session is transmitted over plain HTTP?
What can be observed in Wireshark when the session is transmitted over plain HTTP?
What is the purpose of ransomware?
What is the purpose of ransomware?
What is the significance of the C2 sequence in the context of cyber attacks?
What is the significance of the C2 sequence in the context of cyber attacks?
How is encryption typically performed in cyber attacks?
How is encryption typically performed in cyber attacks?
What is the role of browser extensions in changing session cookies?
What is the role of browser extensions in changing session cookies?
What type of file was involved in the attack scenario described?
What type of file was involved in the attack scenario described?
What is the action taken by the user that leads to the suspicious POST requests?
What is the action taken by the user that leads to the suspicious POST requests?