Hi, what do you want to do?
Curated Video
Dissecting FTP
In this tutorial, you will learn the modes FTP functions under as well as their security architecture.
Curated Video
Why a Regular Domain User Can be a Real Security Threat
In this video you will learn about the reasons why a regular domain user can be a real danger to your environment, and why those generic and shared Active Directory accounts should not exist.
Curated Video
Wireshark D5 V2 - HTTP analysisFTP analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 2: FTP analysis
Curated Video
Wireshark D1 V1 - Master Wireshark Overview
DAY ONE - We will introduce Wireshark and setup our environment - Video 1: Overview
Curated Video
Wireshark D5 V7 - HTTP analysisTroubleshoot your network
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 7: Troubleshoot your network
Curated Video
Wireshark D3 V7 - Expressions and buttons
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 7: Expressions and buttons
Curated Video
No Password !! No Issue, You Can Still Hack
No Password !! No Issue, You Can Still Hack
Curated Video
Wireshark D5 V1 - HTTP analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 1: HTTP analysis
Curated Video
Wireshark D4 V7 - ICMPv6 Deep Dive
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 7: ICMPv6 deep-dive
Curated Video
Wireshark D4 V5 - IPv6 Deep Dive
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 5: IPv6 deep-dive
Curated Video
Wireshark D2 V4 - View Menu
DAY TWO - We will explore Wireshark interface in details - Video 4: View menu
Curated Video
Wireshark D5 V3 - HTTP analysisDNS analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 3: DNS analysis
Curated Video
Wireshark D3 V4 - How is traffic capturedCapture Filters
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 4: Capture filters
Curated Video
Wireshark D3 V2 - How is traffic capturedSPAN Port
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 2: SPAN ports
Curated Video
Wireshark D2 V1 - File Menu
DAY TWO - We will explore Wireshark interface in details - Video 1: File menu
Curated Video
Insufficient Logging and Monitoring
Insufficient logging and monitoring is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Curated Video
Wireshark D4 V2 - TCP Deep Dive
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 2: TCP deep-dive
Curated Video
Wireshark D3 V6 - Finding and marking packets
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 6: Finding and marking packets
Curated Video
Wireshark D5 V5 - HTTP analysisMTP analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 5: SMTP analysis
Curated Video
Wireshark D2 V3 - Edit Menu
DAY TWO - We will explore Wireshark interface in details - Video 3: Edit menu
Curated Video
Explore Main Services and Install Necessary Programs
This video will help you get started in setting up your lab
Curated Video
Wireshark D5 V6 - HTTP analysisARP analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 6: ARP analysis
Curated Video
Wireshark D3 V5 - Display filters
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 5: Display filters
Curated Video
Broken Authentication
This video will explain the broken authentication on web applications and how can attackers leverage this vulnerability to gain unauthorized access