From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 2 Security Monitoring
Unlock the full course today
Join today to access over 24,100 courses taught by industry experts.
Understanding conversations and endpoints
From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 2 Security Monitoring
Understanding conversations and endpoints
- [Instructor] Once you begin capturing traffic, Wireshark keeps track of all the connections or streams. Now, once you have a connection, your operating system creates a socket, which is an IP address and a port. And if we drop down TCP, you can see stream index zero. Well now, we know there's no field value called stream index. It's Wireshark's way of keeping track of all your connections. Now, if you wanted to see all your active connections on a Window machine, we would open a command line and run netstat -an. Now once you run that command and I'll scroll up, you'll be able to see all your active connections. So Wireshark's doing that as well and there's a couple of features that we can use in Wireshark to help us keep track of what's happening and one of them is conversations and endpoints. In Wireshark, a conversation is between two end points. An endpoint is one side of the conversation. To view all the…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
Obtaining a packet capture with Wireshark4m 50s
-
(Locked)
Understanding conversations and endpoints5m 42s
-
(Locked)
Visualizing session and transactional data4m 46s
-
(Locked)
Analyzing statistical data2m 46s
-
(Locked)
Sending alert data2m 21s
-
(Locked)
Investigating an IDS alert6m 9s
-
(Locked)
Challenge: Using Wireshark to examine DNS traffic1m 26s
-
(Locked)
Solution: Using Wireshark to examine DNS traffic2m 49s
-
-
-
-