Pluralsight | Identify Common Cyber Network Attacks with Wireshark [FCO]

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size685.6 MB
  • Uploaded BySunRiseZone
  • Downloads307
  • Last checkedNov. 01st '21
  • Date uploadedOct. 29th '21
  • Seeders 45
  • Leechers2

Infohash : B69327BB89E4BF32A3AA5E9BB09A0C03DD5B5A3F

Lynda and other Courses >>> https://www.freecoursesonline.me/
Forum for discussion >>> https://1hack.us/




Created by : Christopher Greer
Language : English
Updated : Oct 12, 2021
Duration : 2h 34m
Course Source : https://www.pluralsight.com/courses/identify-common-cyber-network-attacks-wireshark

About

This course will teach you how to quickly spot cyber attacks and indicators of compromise in network traffic with Wireshark.

Description

Cyber attacks are everywhere. Are they lurking in your network? Every IT professional needs to develop the skills with Wireshark to quickly spot them. In this course, Identify Common Cyber Network Attacks with Wireshark, you’ll gain the ability to threat hunt at the packet level. First, you’ll explore how network and OS Fingerprinting scans work and how to identify them. Next, you’ll discover how to spot indicators of compromise in malware infections. Finally, you’ll learn how to isolate botnet and data exfiltration traffic. When you’re finished with this course, you’ll have the skills and knowledge of threat hunting with Wireshark needed to identify common cyber network attacks on your network.

Course Overview

Hi everyone. My name is Chris Greer, and welcome to my course, Identify Common Cyber Network Attacks with Wireshark. I'm a network analyst and a Wireshark instructor at Packet Pioneer, and I'm excited to show you how all IT professionals can use this tool to quickly spot cyberattacks and network traffic. After all, even with our IDS systems in place, cybersecurity attacks have become so common that threat hunting with Wireshark is no longer an optional skill for IT pros. Engineers need to quickly spot enumeration scans, malware behavior, data exfiltration efforts, and other suspect traffic with Wireshark, especially during incident response. But before we can do that, we first need to know how these common attack methods work and how to identify them at the packet level. So join me, and you'll get hands-on experience with pcap examples of common threats and learn how to spot them in Wireshark. In this course, you'll learn how to filter for network scans and OS fingerprinting, how to spot traffic exfiltration in the packets, you'll learn the top 10 attack patterns to search for, and how to identify common indicators of compromise in malware behavior. By the end of this course, you'll have the skills necessary to quickly spot cyber network attacks with Wireshark. Before beginning the course, you should have already viewed the first course in this path, Wireshark Configuration for Cybersecurity Analysis. I hope that you'll join me on this journey to learn how to threat hunt with Wireshark, here at Pluralsight.

Level

• Intermediate

About Author

Chris Greer is a network analyst for Packet Pioneer, delivering training and packet analysis consulting services to customers all over the world. He specializes in using Wireshark to combat network and application performance problems on networks of all sizes. Chris leverages his 20 years of practical experience in network monitoring, analysis, and troubleshooting to heighten the experience of any attendee to his interactive and energetic courses.

Files:

[FreeCoursesOnline.Me] Pluralsight - Identify Common Cyber Network Attacks with Wireshark 0. Websites you may like
  • 0. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url (0.4 KB)
  • 1. FreeCoursesOnline.Me Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url (0.3 KB)
  • 3. FTUApps.com Download Cracked Developers Applications For Free.url (0.2 KB)
  • For $3, Get Anything Official like Windows 11 keys + Microsoft Office 365 Accounts! Hurry! Limited Time Offer.url (1.8 KB)
  • How you can help our Group!.txt (0.2 KB)
01. Course Overview
  • 01. Course Overview.mp4 (4.6 MB)
02. When to Break Out Wireshark for Threat Hunting
  • 02. Course Introduction.mp4 (2.5 MB)
  • 03. When to Break out Wireshark for Threat Hunting.mp4 (3.1 MB)
  • 04. Starting with IDS Alerts and Firewall Server Event Logs.mp4 (5.1 MB)
  • 05. Packet Analysis and the MITRE ATTCK Framework Cyber Kill Chain.mp4 (2.1 MB)
  • 06. Module Review.mp4 (709.5 KB)
03. Analyzing Port Scans and Enumeration Methods
  • 07. Module Intro.mp4 (1.7 MB)
  • 08. Network and Host Discovery Scans.mp4 (5.2 MB)
  • 09. Lab 1 - Detecting Network Discovery Scans with Wireshark.mp4 (24.5 MB)
  • 10. Lab 2 - Identifying Port Scans with Wireshark.mp4 (31.9 MB)
  • 11. Lab 2 - Part 2 - Detecting Port Scans.mp4 (20.6 MB)
  • 12. Lab 3 - Analyzing Malware for Network and Port Scans.mp4 (40.4 MB)
  • 13. Lab 3 - Part 2 - Analyzing Malware for Network and Port Scans.mp4 (16.0 MB)
  • 14. How OS Fingerprinting Works.mp4 (5.5 MB)
  • 15. Lab 4 - Detecting OS Fingerprinting with Wireshark.mp4 (36.2 MB)
  • 16. Lab 4 - Part 2 - Detecting OS Fingerprinting.mp4 (26.7 MB)
  • 17. How HTTP Path Enumeration Works.mp4 (3.1 MB)
  • 18. Lab 5 - Analyzing HTTP Path Enumeration with Wireshark.mp4 (40.7 MB)
  • 19. Module Review.mp4 (786.1 KB)
04. Analyzing Common Attack Signatures of Suspect Traffic
  • 20. Module Intro.mp4 (764.8 KB)
  • 21. How to Find Suspect Traffic Patterns.mp4 (3.8 MB)
  • 22. Spotting Network Attacks - The Top 10 Things to Look For.mp4 (4.0 MB)
  • 23. Lab 4 - Analyzing TCP SYN Attacks.mp4 (20.9 MB)
  • 24. Identifying Unusual Country Codes with GeoIP.mp4 (4.0 MB)
  • 25. Lab 7 - Spotting Suspect Country Codes with Wireshark.mp4 (27.3 MB)
  • 26. Lab 8 - Filtering for Unusual Domain Name Lookups.mp4 (19.4 MB)
  • 27. Analyzing HTTP Traffic and File Transfers.mp4 (5.0 MB)
  • 28. Lab 9 - Analyzing HTTP Traffic and Unencrypted File Transfers.mp4 (39.8 MB)
  • 29. Spotting Data Exfiltration Brute Force Password Behavior and Reverse Shell.mp4 (4.4 MB)
  • 30. Lab 10 - Analysis of a Brute Force Attack.mp4 (25.9 MB)
  • 31. Module Review.mp4 (962.8 KB)
05. Identifying Common Malware Behavior
  • 32. Module Intro.mp4 (819.0 KB)
  • 33. What Is Malware How Can I Spot It.mp4 (4.5 MB)
  • 34. Indicators of Compromise in Malware Analysis.mp4 (1.9 MB)
  • 35. Lab 11 - Malware Analysis with Wireshark - Part 1.mp4 (43.7 MB)
  • 36. Lab 11 - Malware Analysis with Wireshark - Part 2.mp4 (15.1 MB)
  • 37. Module Review.mp4 (1.5 MB)
06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic
  • 38. Module Intro.mp4 (1,018.7 KB)
  • 39. How to Identify Shells and Reverse Shells.mp4 (4.4 MB)
  • 40. Lab 12 - Analyzing Reverse Shell Behavior .mp4 (9.9 MB)
  • 41. How to Spot Botnet Traffic.mp4 (5.5 MB)
  • 42. Lab 13 - Identifying Botnet Traffic with Wireshark.mp4 (37.7 MB)
  • 43. Lab 13 - Identifying Botnet Traffic - Part 2.mp4 (35.6 MB)
  • 44. How to Identify Data Exfiltration.mp4 (4.9 MB)
  • 45. Lab 14 - Analyzing Data Exfiltration with Wireshark.mp4 (35.9 MB)
  • 46. Module Review.mp4 (497.6 KB)
  • 47. Course Review.mp4 (1.7 MB)
Exercise Files 02
  • when-to-break-out-wireshark-for-threat-hunting-slides.pdf (2.9 MB)
03
  • analyzing-port-scans-and-enumeration-methods-slides.pdf (4.3 MB)
  • demos
    • Lab1_NetworkScan.pcapng (124.7 KB)
    • Lab2_Network_PortScan.pcapng (470.7 KB)
    • Lab3_AnalyzinganAttack.zip (7.3 MB)
    • Lab4_OSFingerprint.pcapng (677.2 KB)
    • Lab5_EnumeratingWeb.pcapng (498.5 KB)
    • chriscoloringrules (4.4 KB)
    04
    • analyzing-common-attack-signatures-of-suspect-traffic-slides.pdf (4.2 MB)
    • demos
      • Lab10_BruteForceFTP.pcapng (60.4 KB)
      • Lab6_TCPSYNs.pcapng (543.2 KB)
      • Lab7_CountryCodes.pcapng (543.3 KB)
      • Lab8_DomainNames.pcapng (12.7 KB)
      • Lab9_HTTPTransfers.pcapng (13.1 MB)
      05 demos
      • Lab 11_MalwareAnalysis.pcapng (8.2 MB)
      • identifying-common-malware-behavior-slides.pdf (4.0 MB)
      • 06 demos
        • Lab13_AnalyzingBotnet.pcapng (3.7 MB)
        • Lab14_DataExfiltration.pcapng (1.8 MB)
        • identify-shell-reverse-shell-botnet-and-ddos-attack-traffic-slides.pdf (1.2 MB)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce