Networking for Hackers and Cybersecurity Professionals (How long will it take to learn something new?)

Networking for Hackers and Cybersecurity Professionals (How long will it take to learn something new?)

HomeDavid BombalNetworking for Hackers and Cybersecurity Professionals (How long will it take to learn something new?)
Networking for Hackers and Cybersecurity Professionals (How long will it take to learn something new?)
ChannelPublish DateThumbnail & View CountDownload Video
Channel AvatarPublish Date not found Thumbnail
0 Views
Let's play a game. How long does it take you to learn something new in this video?

// YouTube VIDEOS mentioned //
TLS HTTP/2 and QUIC decryption with Wireshark: https://youtu.be/yodDbgoCnLM

// YouTube PLAYLIST //
Wireshark with Chris Greer: https://www.youtube.com/watch?vrmFX1V49K8U&listPLhfrWIlLOoKO8522T1OAhR5Bb2mD6Qy_l&ppiAQB

// David SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/@davidbombal

// MY STUFF //
https://www.amazon.com/shop/davidbombal

// MENU //
00:00 – Presentation
00:28 – My configuration
00:43 – Do you know?
01:26 – Start of the demonstration with Telnet
03:54 – Port numbers explained in more detail
04:55 – Using Apache2
06:29 – How are port numbers assigned?
08:39 – Ephemeral ports
10:42 – Using Fing
11:34 – Apache2 restart and TCP refusal
15:54 – What port numbers do clients actually use?
5:46 p.m. – On Ubuntu
7:01 p.m. – Theory versus reality
23:37 – Difference between port number and socket
26:07 – Continuation of the demonstration
29:04 – What you have learned so far
29:54 – One last demonstration
32:34 – Conclusion and conclusion

// Detailed MENU //
00:00:00 – Introduction to the game
– David presents a game in which spectators comment on the timestamp or topic and learn something new.

00:00:11 – Importance of port numbers
– Emphasis is placed on understanding port numbers for those interested in cybersecurity, networking, or other areas.

00:00:24 – Network configuration
– David describes the network setup involving Kali Linux, Cisco routers, Windows computer and mobile devices.

00:00:48 – Understanding ports and sockets
– Queries on the difference between port numbers and sockets, and their relevance in TCP/IP.

00:01:28 – Demonstration with PuTTY and Telnet
– A hands-on demonstration using PuTTY and Telnet to connect to a specific port on a Cisco router.

00:03:04 – Character generator (CHARGEN) protocol discussion
– Explain the CHARGEN protocol and its historical significance.

00:03:11 – Disabling small TCP services and testing connection refusal
– The process of disabling small TCP services on a router and testing the impact on connectivity.

00:04:01 – Setting up Kali Linux server and starting Apache service
– Setting up a server on Kali Linux and starting the Apache service.

00:05:09 – Network traffic analysis with Wireshark
– Using Wireshark to analyze traffic and understand port numbers in network communications.

00:06:39 – Understanding IANA port numbers and ephemeral ports
– An overview of the IANA port number list and an explanation of ephemeral ports.

00:07:54 – Differences between FC and OS in port usage
– Discuss RFCs and how different operating systems use different port ranges.

00:08:54 – Testing port accessibility with mobile devices
– Use mobile devices to test the accessibility of network ports.

00:11:38 – Implementing access lists on Cisco router
– Creating and modifying access lists on a Cisco router to control network traffic.

00:14:06 – Difference between port numbers and sockets
– Explain the conceptual difference between port numbers and sockets.

00:16:00 – Demonstrating SSH connections and port usage
– Demonstration of SSH connections from different devices and analysis of port usage.

00:18:03 – Blocking SSH traffic with access lists
– Block SSH traffic using access lists on a router and observe the effects.

00:21:37 – Discussion about DNS protocol and traffic blocking
– Discussion of DNS protocols and the impact of blocking DNS traffic with access lists.

00:27:41 – Explore HTTPS and QUIC protocols with browser examples
– Explore HTTPS and QUIC protocols using various web browsers and analyze network traffic.

00:32:11 – Conclusion and ideas for future content
– Final remarks and thoughts on future networking-related content.

Kali Linux
Linux
nmap
SSL
http
https
shh
telnet
charge
port
port numbers
wire shark

#kalilinux #cybersecurity #hacker

Please take the opportunity to connect and share this video with your friends and family if you find it useful.