OSI Model Lab Instructions Part 1

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

4 hours 21 minutes
Video Transcription
All right, s Oh, uh, hey, who's that? You You know,
You know, I think that just might be the single greatest pop star alive.
All right, well dressed a little bit. I won't get Joe going on that. We're gonna dump it, I won't go. So I'm gonna hop out of the president presentation here for a second. I'll jump into the lab environment will kind of get that agenda. So I didn't want to show you some different commands.
A CZ Well, a cz show you the wire shark tool. So you'll see. I'm kind of Jennings. Things up here might take a murmur. So the reason I do that is I didn't want to run out of time on my lap sessions. That would kind of be kind of awkward to try to gen stuff up. And then nothing was working. So I'm just gonna power it up real quick, just as it takes a minute or so. Here, having all kind of ramble as we do that,
we'll get it going.
So we're starting off here with wire shark, probably just because it's gonna go a little faster than the other lab environment, and then we'll jump into the windows commands. So don't worry about all these little error messages that are popping up. If you decide Thio, if you have access to the cyber labs you decide to do, Ah, wire, Shark lab, then you're kind of be able to read through those.
I'm just gonna kind of go through and show you wire shark. I'll show you
capturing some packets. I opened up the packing to show you like some of the stuff that's in it. Now we're not gonna go in depth as far as like grabbing a using a password or anything like that. This is really just showing you like I P addresses and the packets. Just because we're not actually, as I mentioned, showing you are, you know, doing any type of attack here.
I'm just gonna open up a white shark. Of course, I could cook the shortcut icon, but you know, like, where's the where's the real fun? And, you know, there's no fun and clicking shortcuts there, so I'll just open up a terminal here and just thio pseudo pseudo terminal
pseudo wires.
So it's gonna ask me for a password, and I'm not gonna tell you what? That is a super secret.
But if you do the lab, you know, you'll get that. Ignore that error messages. Like I said, just ignore the air's. So now we have Warner shirt. This is this is what it looks, right? So we got different shortcut icons at the top here where we can, you know, start a capture stop cat capture, etcetera.
We could also do different things from the actual drop down menu here,
and we're actually gonna go ahead and we'll just start capture. So let's go to capture the options. And again, don't follow along here. You don't worry about follow along.
So I'm gonna select my network interface, which is gonna be a e th zero or zero.
The other thing I'm gonna do is just unchecked these boxes. I do wanna have a promiscuous mode, so that way I'm letting everything through. I'm just gonna say start.
So, uh, you're not gonna see anything here initially, you see, a little bit, but again, it's kind of like All right, well, nothing's happening.
Let's make something happen. All right?
I'm gonna open another terminal window here. We're just gonna do a quick ping. So We kind of talked about the ping command. What's actually take a look? At what? That So, uh, I think this is the I P address. We'll find out in a second here.
So we just got a ping and we're gonna see what kind of replies we get back. So, as I mentioned, you know, with the window is when we do the paying room, see, basically the same stuff were two c i p addresses
that we're trying to ping, and we're to see how long it's taken for the information to come back to us. And if we even are getting information back
as I'm rambling, what you notice in the ground there's all this is moving, right?
So we're basically capturing packets.
We can let their run for a moment or so. I'm just gonna go ahead and just stop it. So all this control c and just kill this terminal window. So what's actually take a look at, like, one of these? Right, So we see we got ICMP packets or UDP.
Don't worry about what that is for this session. If you decide to be a network engineer, you'll obviously learn all about the different packaging. Joe's giggling because he knows. But we'll just take a look at this one right here. So what we have in this packet as it moves away from me
on the screen there, we're gonna crank open these. So we got our frame here.
User Net R I p protocol.
What? You're gonna notice years. We've got our source i P address and then our destination i p address. So if you remember,
based on how this is occurring are based on the i P address I used in the Ping, we're seeing that information, right?
So this is our return.
Let's go back for you to be one.
I hope it all these up again.
So the other thing you're seeing here is our Mac address
for the particular device as well as this. Ones are
local. Mac are broadcast address. Excuse me. So we see the f f f f f f f all the way through. Basically, you have 12
components here of your Mac address or 12 for getting out. I want to say this, but basically you have 12 characters, so to speak in your back in any Mac address again. Not something we're covering here. But you see that we could get potentially getting some good information from these package. So if I was doing, like an attack on Joe, for example,
paying his servers,
nor his devices and see, you know, one of the I P addresses where the Mac addresses for those devices and also get some different information about the frames themselves, You know how long thinking to get information back
from that particular device?
The other thing we could see if we were doing it here, we could actually potentially see a user name and password of is being transmitted in plain text. We could grab that from here is so I didn't want to go to in depth of wire certain that's gonna stop capture there.
But this is kind of what it looks like. And just some of the information that you could get from now. This is by no means
for sure, of course, or even a session. There's a lot of stuff you could do with wire shark, but I don't wantto overload you in this particular session. So any questions for me, Joe, Anything else you want me to show him in wire shark Quick. I don't think in wire short. We do have one question we can ask. Now we have one of our one of our students is asking
currently working on her master's in computer science, which is just starting off with networking or somewhere else
s. So, what is your Is your undergrad a different degree, I guess. What? My question on that. But yeah, I would say, if you're going for your masters in computer science and you're transitioning like, if your undergrad is like history or something like that, then yes, I would actually start off with. Networking is kind of your phone.
I think the bulls off there, you know? So
there's a network engineer and then cybersecurity itself. Kind of build off of that yet
everything. But the point does still stand okay.
Yeah. Yeah. And actually, as part of your masters, it should be kind of building you off
somewhat rare that they wouldn't. If you don't have an I t back on, they wouldn't. Normally most masters wouldn't take you in the program
if you don't have an I t back. But there's probably some other that do. It still stands as Joe mentioned that you start out with networking and they kind of work your way up. You know, learn some scripting, different scripting like python or something. Which, by the way, Joe has some courses coming on soon. And then also, you know, from their kind of build out into more the cyber security focus in your master's program.
And I would assume that whatever program you're doing,
he's kind of structured along those lines.
And then I'm actually gonna answer this next one from Bradley. Any resource is involving detailed information on various packet types that could be suggested. We've got a couple. The first, really is. We've actually got a wire short class that is either up or is about to go up on our site. It's gonna have a bunch of really deep dive information on it. Additionally, wire shark. If you go to the wire short website,
their help documentation is
absolutely spectacular. It's a really, really good place to get started.
Absolutely. Absolutely.
Yeah, we d'oh, we do have yet, So if you basically start from the catalogue the word wire shark, you'll see all sorts of things
Up Next
Introduction to IT & Cybersecurity

In this FREE IT and cybersecurity training for beginners, you will learn about the four primary disciplines of information technology (IT) and cybersecurity. This introduction to IT course is designed to help you decide which career path is right for you.

Instructed By