PDA

View Full Version : Question for people that have bitspyder/bitme access



bigtone
01-22-2008, 03:53 PM
Do either of these sites have wireshark university courses 1 through 3? I have 4 but I'd like to complete the set, if anyone could let me know I'd appreciate it.

Giveaway
01-22-2008, 03:59 PM
yes on bitme there is the whole torrent.

Wireshark University - Wireshark Network Forensics and Security


Wireshark University - Wireshark Network Forensics and Security - Courtesy Bitspyder

Self-Paced Course Materials
The self-paced course provides voice-over-video training sessions on DVD. Course materials
include lab instructions (PDF format), resources/references for network analysts (PDF format),
lab trace files (PCAP format) and general trace files for further study.

Course Content
This course focuses on network forensics including capture locations, stealth-mode capture,
optimal capture and display filters, validating encrypted logins, identifying reconnaissance
processes, locating header and payload signatures, catching penetration tests, malware
behavior, backdoor communications and virus traffic.

Section 1: Analyzer Placement
a) Analyzing Hubbed Networks
b) Analyzing Switched Networks
c) Analyzing Routed Networks
d) Analyzing WAN Links
e) Tapping into Full-Duplex Links
f) Capturing in Stealth Mode
g) Obtaining Evidence Using a Honeypot

Section 2: Unususal Network Communications
a) Vulnerabilities in the TCP/IP Resolution Process
b) Route Resolution
c) Spotting Unacceptable Traffic

Section 3: Reconnaissance Processes
a) Port Scans
b) Mutant Scans
c) IP Scans
d) Application Mapping
e) OS Fingerprinting

Section 4: Analyzing ICMP Traffic
a) ICMP Types and Codes
b) ICMP Discovery
c) Router Redirection
d) Dynamic Router Discovery
e) Service Refusal
f) OS Fingerprinting

Section 5: TCP Security
a) TCP Segment Splicing
b) TCP Fake Resets

Section 6: Address Spoofing
a) MAC Address Spoofing
b) IP Address Spoofing

Section 7: Building Firewall ACL Rules
a) Overview of ACL Rule Types

Section 8: Signatures of Attacks
a) Signature Locations
b) Header Signatures
c) Sequencing Signatures
d) Payload Signatures
e) Obtaining Signatures
f) Attacks and Exploits
g) Password Cracks
h) Denial of Service Attacks
i) Redirections

bigtone
01-22-2008, 04:14 PM
Giveaway, thanks for checking for me, I alread have WSU04 - Wireshark Network Forensics and Security.

I am looking for the previous 3 in the series

WSU01 - Wireshark Functionality and Fundamentals

(http://www.wiresharktraining.com/catalog.html)WSU02 - TCP/IP Network Analysis

(http://www.wiresharktraining.com/catalog.html)WSU03 - Troubleshooting Network Performance