﻿1
00:00:00,820 --> 00:00:07,480
‫So let's have a look at the network sniffing methods first, we're going to learn how to listen to the

2
00:00:07,480 --> 00:00:12,280
‫network traffic and how to use some tools such as TCP Dump and Wireshark.

3
00:00:14,050 --> 00:00:20,830
‫During the penetration test, we listen to the network traffic for many good reasons, first of all,

4
00:00:21,460 --> 00:00:28,150
‫it's possible to obtain the clear text, critical information such as usernames, passwords, instant

5
00:00:28,150 --> 00:00:29,680
‫messages, emails and all that.

6
00:00:30,880 --> 00:00:33,910
‫We can check to see if the scans were correctly.

7
00:00:34,800 --> 00:00:40,470
‫And some controls can be seen by listening to the network interface, such as if the scan parameters

8
00:00:40,470 --> 00:00:46,860
‫are set correctly, packets are properly exported from the network interface and responses are received.

9
00:00:48,060 --> 00:00:54,660
‫Listening to the traffic, using passive scan methods, we can collect information about IP addresses,

10
00:00:55,170 --> 00:01:01,680
‫services running on server systems and protocols and technologies used in network infrastructures,

11
00:01:01,680 --> 00:01:02,720
‫et cetera, et cetera.

