Traffic Capture Introduction (part 1)

Video Activity

This video introduces how to get traffic not intended for your network. In subsequent videos, participants will be shown how to use a variety of tools and commands to monitor traffic.

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
14 hours 26 minutes
Difficulty
Advanced
CEU/CPE
15
Video Description

This video introduces how to get traffic not intended for your network. In subsequent videos, participants will be shown how to use a variety of tools and commands to monitor traffic.

Video Transcription
00:04
right now, we're gonna take a
00:06
little sidetracked between our vulnerability assessment and then our exploitation. And we're looking at some traffic capturing.
00:15
So we'll take a look at ways we can get traffic that is not intended for us on. Get it to come to us, maybe even get some things that are encrypted. Never know. We'll see some other traffic capturing techniques in other sections with these are the basic building blocks of getting data that
00:35
doesn't necessarily need to be coming to us.
Up Next