Time
14 hours 26 minutes
Difficulty
Advanced
CEU/CPE
15

Video Description

This video introduces how to get traffic not intended for your network. In subsequent videos, participants will be shown how to use a variety of tools and commands to monitor traffic.

Video Transcription

00:04
right now, we're gonna take a
00:06
little sidetracked between our vulnerability assessment and then our exploitation. And we're looking at some traffic capturing.
00:15
So we'll take a look at ways we can get traffic that is not intended for us on. Get it to come to us, maybe even get some things that are encrypted. Never know. We'll see some other traffic capturing techniques in other sections with these are the basic building blocks of getting data that
00:35
doesn't necessarily need to be coming to us.

Up Next

Advanced Penetration Testing

The Advanced Penetration Testing course teaches the cyber attack lifecycle from the perspective of an adversary. Become more familiar with the most widely used penetration-testing tools, manipulate network traffic, and perform web application attacks such as cross-site scripting and SQL injection.

Instructed By

Instructor Profile Image
Georgia Weidman
Founder and CTO at Shevirah and Bulb Security
Instructor