

This video is from module 4, where we analyze different protocols, listen to VoIP communications and playback using the captured packets.

How to split and merge large captured traces.

How to capture the traffic in multiple datasets.

Filter traffic based on your own rules that you created.Know what’s happening inside the network traffic.Wireshark is useful even in session hijacking of authenticated users and it is the industry leading tool that every ethical hacker, network admin, system admin and even malicious hackers or black hat hackers uses to perform advanced security analysis and attacks. As Wireshark is used widely inside commercial, non-profit, educational and at various places, it becomes crucial for IT people to have thorough knowledge about Wireshark’s capabilities to get insights at a microscopic level in a network and know what’s happening in order to analyze, troubleshoot, monitor and sometimes capture sensitive credentials passing through the wires. But Wireshark always comes to the rescue in such situations. Network analysis and troubleshooting data packets in a network is always a daunting task. Wireshark is the world’s foremost and most widely-used network protocol analyzer.
