Chris and I go deep into what Nmap is actually sending onto the network and how you can find those dodgy packets! We then get into a real world Wireshark discussion on how to find stuff in a sea of packets.
// MENU //
0:00 ▶️ Welcome
2:15 ▶️ What is Nmap?
3:54 ▶️ TCP SYN and TCP connect scans
6:55 ▶️ Wireshark IP Filter
7:42 ▶️ Wireshark TCP Port Filter
7:57 ▶️ Stealth Scan
09:37 ▶️ Why it’s called a stealth scan
11:02 ▶️ Connect() scan
11:50 ▶️ How to identify potential Nmap scans in Wireshark
15:05 ▶️ Wireshark filters to find potential stealth scans
19:08 ▶️ Nmap Port Flag
20:16 ▶️ What makes a TCP connect scan different
22:47 ▶️ What is TCP Conversation Completeness
26:16 ▶️ Wireshark filter to identify potential TCP connect scans
29:06 ▶️ Are devices good enough today to capture huge amounts of data?
31:09 ▶️ Network Traffic Monitoring Device
32:55 ▶️ How to find specific data in huge files
42:27 ▶️ Final tips for beginners in cybersecurity
43:27 ▶️ Topics for future videos
// Wireshark pcap file //
https://davidbombal.wiki/nmapstealth
// Wireshark documentation //
https://www.wireshark.org/docs/wsug_html_chunked/ChAdvTCPAnalysis.html
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
//CHRIS GREER //
LinkedIn: https://www.linkedin.com/in/cgreer/
YouTube: https://www.youtube.com/c/ChrisGreer
Twitter: https://twitter.com/packetpioneer
Pluralsight: TCP Analysis Course: https://davidbombal.wiki/tcpwireshark
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
nmap
nmap stealth scan
nmap scan
nmap hacking
nmap scan types
wireshark
wireshark tcp
packet analysis
ccna
cisco ccna
wireshark nmap
wireshark real world
real world wireshark
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#nmap #wireshark #hacking
source
Generally in production environment nmap is disabled in Linux servers. But this session is really knowledgeable. Thank you so much David.
I have started in this beautiful world of content on YouTube, I am new to this and here we go with issues of cybersecurity and ethical hacking
How to notice congestion with my internet circuit? For example, if we have a modem, a router and a switch with a bunch of devices comnected and the circuit is 5 Mbps upload and 10 Mbps download. How can i tell that circuit is being maxed out?
Thank you so much David and Chris for the great content you are providing to your audiences. Please keep this series rolling.
Really Appreciate This Sort Of Content On YouTube
Great video!!! I can't wait until the next one.
Love the white hat… symbolic.
What are good resources for patterns that should be watched and alerted for?
It's weird! I don't that TCP Conversation completeness while running nmap -sT -F thehost in my wireshark. Any clues guys?
David sir can you please tell me, that acer predator helios 300 is good for cyber security? 🙏
❤️ from 🇮🇳
MetaData(x+y+.. = z) and Time(10^-x sec) is very insane. Unfortunately, this is a precise solution to every problem. 🙃🌌… BTW TQSM for such a valuable Content Share. 👏👏👏👏👍👍👍
Thanks David. Chis is awesome! Please continue to have him on the channel.I love learning new things and keep up the great content! 👍
I enjoy david's videos and I'm currently combining Algotrading with Cybersecurity. And it helps that I am a Gman in NoVa.
I would like to understand the attacking methods more as i dont know what im looking for. That said i think you did it here 😄 scanning, how it works, how it will show up, what to look for. So keep this going! Maybe man in the middle next? Great content👍
I'm doing your wireshark course on udemy. This video is a great addition to this course. Thank you!
Hey David, this is kinda off topic but I had question about ur "How to change Windows 10 MAC Addresses – WiFi and Ethernet" vid. That is how do I make my MAC hidden from sites such as POF as they still seems to see my MAC address despite changing it?
Thank you for this!
Thank you David! Always great content.
Thanks a lot, waiting for more 🙂 , nmap and wireshark are very important not only for cybersecurity but also for network and systems Engineer
Is this a series now? It was excellent
I love these Chris Greer tutorials.
In other news, does anyone else find David scary af?
Thanks for that episode, helpful and interesting
Cool