Channel | Publish Date | Thumbnail & View Count | Download Video |
---|---|---|---|
Publish Date not found | 0 Views |
// YouTube VIDEOS mentioned //
TLS HTTP/2 and QUIC decryption with Wireshark: https://youtu.be/yodDbgoCnLM
// YouTube PLAYLIST //
Wireshark with Chris Greer: https://www.youtube.com/watch?vrmFX1V49K8U&listPLhfrWIlLOoKO8522T1OAhR5Bb2mD6Qy_l&ppiAQB
// David SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/@davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// MENU //
00:00 – Presentation
00:28 – My configuration
00:43 – Do you know?
01:26 – Start of the demonstration with Telnet
03:54 – Port numbers explained in more detail
04:55 – Using Apache2
06:29 – How are port numbers assigned?
08:39 – Ephemeral ports
10:42 – Using Fing
11:34 – Apache2 restart and TCP refusal
15:54 – What port numbers do clients actually use?
5:46 p.m. – On Ubuntu
7:01 p.m. – Theory versus reality
23:37 – Difference between port number and socket
26:07 – Continuation of the demonstration
29:04 – What you have learned so far
29:54 – One last demonstration
32:34 – Conclusion and conclusion
// Detailed MENU //
00:00:00 – Introduction to the game
– David presents a game in which spectators comment on the timestamp or topic and learn something new.
00:00:11 – Importance of port numbers
– Emphasis is placed on understanding port numbers for those interested in cybersecurity, networking, or other areas.
00:00:24 – Network configuration
– David describes the network setup involving Kali Linux, Cisco routers, Windows computer and mobile devices.
00:00:48 – Understanding ports and sockets
– Queries on the difference between port numbers and sockets, and their relevance in TCP/IP.
00:01:28 – Demonstration with PuTTY and Telnet
– A hands-on demonstration using PuTTY and Telnet to connect to a specific port on a Cisco router.
00:03:04 – Character generator (CHARGEN) protocol discussion
– Explain the CHARGEN protocol and its historical significance.
00:03:11 – Disabling small TCP services and testing connection refusal
– The process of disabling small TCP services on a router and testing the impact on connectivity.
00:04:01 – Setting up Kali Linux server and starting Apache service
– Setting up a server on Kali Linux and starting the Apache service.
00:05:09 – Network traffic analysis with Wireshark
– Using Wireshark to analyze traffic and understand port numbers in network communications.
00:06:39 – Understanding IANA port numbers and ephemeral ports
– An overview of the IANA port number list and an explanation of ephemeral ports.
00:07:54 – Differences between FC and OS in port usage
– Discuss RFCs and how different operating systems use different port ranges.
00:08:54 – Testing port accessibility with mobile devices
– Use mobile devices to test the accessibility of network ports.
00:11:38 – Implementing access lists on Cisco router
– Creating and modifying access lists on a Cisco router to control network traffic.
00:14:06 – Difference between port numbers and sockets
– Explain the conceptual difference between port numbers and sockets.
00:16:00 – Demonstrating SSH connections and port usage
– Demonstration of SSH connections from different devices and analysis of port usage.
00:18:03 – Blocking SSH traffic with access lists
– Block SSH traffic using access lists on a router and observe the effects.
00:21:37 – Discussion about DNS protocol and traffic blocking
– Discussion of DNS protocols and the impact of blocking DNS traffic with access lists.
00:27:41 – Explore HTTPS and QUIC protocols with browser examples
– Explore HTTPS and QUIC protocols using various web browsers and analyze network traffic.
00:32:11 – Conclusion and ideas for future content
– Final remarks and thoughts on future networking-related content.
Kali Linux
Linux
nmap
SSL
http
https
shh
telnet
charge
port
port numbers
wire shark
#kalilinux #cybersecurity #hacker
Please take the opportunity to connect and share this video with your friends and family if you find it useful.