![]() You can do this in the Pwnbox provided in the interactive sections or your virtual machine. It is worth reproducing as many examples as possible to reinforce further the concepts presented in each section. The module includes several guided and non-guided labs to reinforce the techniques covered throughout.Īs you work through the module, you will see example commands and command output for the various topics introduced. This module is broken down into sections with accompanying hands-on exercises to practice each of the tactics and techniques we cover. We will cover principles of network traffic analysis and usage of traffic analysis tools such as Wireshark and tcpdump. Network traffic analysis can also be used by both sides to search for vulnerable protocols and ciphers in use. Defenders can use network traffic analysis to collect and analyze real-time and historical data of what is happening on the network. This module introduces network traffic analysis in a general sense for both offensive and defensive security practitioners.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |