INE Training Notes - by syselement
🏠 Home BlogGitHub📚 Buy Me a Book
  • INE Training Notes
  • Courses
    • eJPT - PTSv2
      • 📒Penetration Testing Prerequisites
        • Introduction
        • Networking
        • Web Applications
      • 📒1. Assessment Methodologies & Auditing
        • Information Gathering
        • Footprinting & Scanning
        • Enumeration
          • 🔬SMB Enum
          • 🔬FTP Enum
          • 🔬SSH Enum
          • 🔬HTTP Enum
          • 🔬MYSQL Enum
          • 🔬SMTP Enum
        • Vulnerability Assessment
        • Auditing Fundamentals
      • 📒2. Host & Network Penetration Testing
        • System/Host Based Attacks
          • 🪟Windows Attacks
            • 🔬IIS - WebDAV
            • 🔬SMB - PsExec
            • 🔬RDP
            • 🔬WinRM
            • 🔬Win Kernel Privesc
            • 🔬UAC Bypass
            • 🔬Access Token
            • 🔬Alternate Data Stream
            • 🔬Credentials Dumping
          • 🐧Linux Attacks
            • 🔬Bash
            • 🔬FTP
            • 🔬SSH
            • 🔬SAMBA
            • 🔬Cron Jobs
            • 🔬SUID
            • 🔬Hashes Dumping
        • Network Based Attacks
          • 🔬Tshark, ARP, WiFi
        • The Metasploit Framework (MSF)
          • 🔬HFS - MSF Exploit
          • 🔬Tomcat - MSF Exploit
          • 🔬FTP - MSF Exploit
          • 🔬Samba - MSF Exploit
          • 🔬SSH - MSF Exploit
          • 🔬SMTP - MSF Exploit
          • 🔬Meterpreter - MSF
          • 🔬Win Post Exploitation - MSF
          • 🔬Linux Post Exploitation - MSF
        • Exploitation
          • 🔬Fixing Exploits - HFS
          • 🔬Win Workflow Platform - MSF
          • 🔬Win Black Box Pentest
          • 🔬Linux Black Box Pentest
        • Post-Exploitation
          • 🔬Windows Post-Exploitation
          • 🔬Windows Privilege Escalation
          • 🔬Windows Persistence
          • 🔬Linux Post-Exploitation
          • 🔬Linux Privilege Escalation
          • 🔬Linux Persistence
          • 🔬Cracking Hashes
          • 🔬Pivoting
        • Social Engineering
      • 📒3. Web Application Penetration Testing
        • Intro to Web App Pentesting
          • 🔬HTTP Enumeration
          • 🔬Web App Scanning
          • 🔬Web App Attacks
      • 🔬Exam Preparation - Labs
        • PTSv1 Prerequisites Labs
          • 🔬HTTP(S) Traffic Sniffing
          • 🔬Find the Secret Server
          • 🔬Data Exfiltration
          • 🔬Burp Suite Basics - Directory Enumeration
        • PTSv2 Practice Labs
      • 🌐eJPT References
      • 📜eJPT Cheat Sheet
    • ICCA
      • 📒1. Cloud Foundations
      • 📒2. Cloud Management Concepts
      • 📒3. Cloud Identity, Security, and Compliance
      • 🌐Icca References
    • eMAPT
      • 📒Android
      • 📒iOS
      • 🌐eMAPT References
  • 🏠syselement's Blog Home
Powered by GitBook
On this page
  • Tools
  • Wireshark
  • Tshark
  • arpspoof

Was this helpful?

Edit on GitHub
  1. Courses
  2. eJPT - PTSv2
  3. 📒2. Host & Network Penetration Testing

Network Based Attacks

Previous🔬Hashes DumpingNext🔬Tshark, ARP, WiFi

Last updated 2 years ago

Was this helpful?

⚡ Prerequisites

  • Basic Cybersecurity & Network Concepts

📕 Learning Objectives

  • Describe service related Network Attacks

  • Identify network traffic and perform packet analysis

  • Perform MITM (Man in the Middle) attacks

🔬 Training list - PentesterAcademy/INE Labs

subscription required

🗒️ Network based attacks are attacks targeted towards specific network traffic and services.

  • ARP

  • DHCP

  • SMB

  • FTP

  • Telnet

  • SSH

🗒️ MITM (Man In The Middle) is a type of cybersecurity attack that allows the attacker to eavesdrop/listen on the legitimate communication between two targets.

e.g.

  • Promiscuous mode - listen to all the traffic on a network

Tools

  • e.g. Capture a nmap scan traffic with Wireshark

    • Check the interface before beginning the capture

    • Protocol Hierarchy Statistics

    • Identify all layers looking at captured packets

    • Default time display setting is relative time in seconds

    • Follow > TCP Stream to check an entire stream

  • Native capture file format is pcapng (Wireshark compatible)

arpspoof


- intercept communication through broadcasting ARP packets and waiting for answers from other machines.

🔬 Check some Wireshark traffic sniffing in

- a network protocol analyzer that captures packet data from a live network or from a saved capture file. It is the CLI component of Wireshark.

- a (old) tool to send out unrequested (and possibly forged) ARP replies and intercept packets on a switched LAN

🔬 Check some hands-on labs in the

Tshark Traffic Analysis
Traffic Analysis: TSHARK Unleashed - Course
WIFI Traffic Analysis
Wi-Fi Security and Pentesting - Course
ARP Poisoning
Wireshark
this lab
Tshark
tshark
arpspoof
Tshark, ARP, WiFi Lab section
https://www.veracode.com/security/man-middle-attack
Wireshark ARP traffic
Wireshark Protocol Hierarchy Statistics
tshark --help
arpspoof -h