{"id":662,"date":"2024-08-03T04:21:16","date_gmt":"2024-08-03T04:21:16","guid":{"rendered":"https:\/\/hackmybox.com\/?p=662"},"modified":"2025-02-03T12:04:37","modified_gmt":"2025-02-03T12:04:37","slug":"network-analysis","status":"publish","type":"post","link":"https:\/\/hackmybox.com\/index.php\/2024\/08\/03\/network-analysis\/","title":{"rendered":"Network Analysis"},"content":{"rendered":"\n<p>Wireshark is an open-source network packet analyzer that allows you to see all the network traffic being transmitted (sent\/received) over a network. This tool is used to identify network problems, troubleshoot slow network issues, and analyze the data being transmitted over the network.<\/p>\n\n\n\n<p>The course includes two practical labs on analyzing PCAP files (packet captures). You\u2019ll apply the basics of Wireshark, use filters and statistics, and analyze network traffic to understand how attackers might gain access to the network.<\/p>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<p><strong>Part 1: Wireshark User Interface<\/strong><\/p>\n\n\n\n<p><strong>Part 2 : PCAP 1 Challenge<\/strong> <\/p>\n\n\n\n<p><strong>Part 3: PCAP 2 Challenge<\/strong><\/p>\n\n\n\n<p><strong>Part 4:  Additional Wireshark Filters<\/strong><\/p>\n\n\n\n<p><strong>Part 5: Recommended Free Wireshark Resources!<\/strong><\/p>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-left has-medium-font-size\"><strong><em>Part 1: Wireshark User Interface<\/em><\/strong><\/p>\n\n\n\n<p>Before we dive into the course review, let&#8217;s first explore Wireshark user interface.<\/p>\n\n\n\n<p>1. Main menu \u2013 It\u2019s divided into several sections, each containing a set of related options common below.<\/p>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<ul class=\"wp-block-list\">\n<li>File Menu &#8211;  contains items to open , save, print, or export capture files .\u00a0<\/li>\n\n\n\n<li>View Menu &#8211;  display of the captured data, including colorization of packets, zooming the font, showing a packet in a separate window, expanding and collapsing trees in packet details<\/li>\n\n\n\n<li>Go Menu &#8211; items to go to a specific packet<\/li>\n\n\n\n<li>Capture &#8211; allows you to start and stop captures and to edit capture filters.\u00a0<\/li>\n\n\n\n<li>Statistics  &#8211; contains items to display various statistic windows, including a summary of the packets that have been captured, display protocol hierarchy statistics and much more.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<p>2. Main toolbar &#8211; allows easy access to frequently used menu. Common functions such as to start , stop , save as or open capture file (pcap).<\/p>\n\n\n\n<p>3. Filter toolbar &#8211; lets you quickly edit and apply display filters to quickly and easily focus on specific packets within a large capture.<\/p>\n\n\n\n<p>4. Packet list pane &#8211; Each line in the packet list corresponds to one packet in the capture file. If you select a line in this pane, more details will be displayed in the \u201cPacket Details\u201d and \u201cPacket Bytes\u201d panes.<\/p>\n\n\n\n<p>5. Packet details pane &#8211; displays detailed information about a selected packet.<\/p>\n\n\n\n<p>6. Packet bytes pane &#8211; displays the raw data of a selected packet in a hexadecimal format<\/p>\n\n\n\n<p>7. Status bar &#8211; displays various types of information such as number of packets captured<\/p>\n<\/div>\n\n\n\n<p class=\"has-small-font-size\">References : Wireshark.org<\/p>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"705\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/07\/Wireshark-1024x705.png\" alt=\"\" class=\"wp-image-664\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/07\/Wireshark-1024x705.png 1024w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/07\/Wireshark-300x207.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/07\/Wireshark-768x529.png 768w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/07\/Wireshark.png 1512w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong><em>Part 2 : PCAP 1 Challenge<\/em>  <\/strong><\/p>\n\n\n\n<p>\ud83d\udd11Key to answering these questions is using the correct filter. Being familiar with filters is essential for locating or tracing the needed information.<\/p>\n\n\n\n<p>1.Which protocol was used over port 3942?<\/p>\n\n\n\n<p>Ports are numerical identifiers used in network communications. Each port is associated with a specific service or application running on a device. \u00a0To determine which protocol was used over port 3942 using Wireshark, you can use a display filter. At the packet details pane we can see details of the protocol.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"269\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image.png\" alt=\"\" class=\"wp-image-669\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image.png 940w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-300x86.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-768x220.png 768w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/figure>\n\n\n\n<p>2.What is the IP address of the host that was pinged twice?<\/p>\n\n\n\n<p>The Internet Control Message Protocol (ICMP) sends error messages and network information between devices in an IP network. One type of ICMP is the Echo request\/reply (ping), which tests if a network host is reachable and measures roundtrip time. <\/p>\n\n\n\n<p>To view only ICMP traffic, type &#8220;ICMP&#8221; in the display filter box and press Enter. This will show only ICMP packets.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"153\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-1.png\" alt=\"\" class=\"wp-image-670\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-1.png 940w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-1-300x49.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-1-768x125.png 768w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/figure>\n\n\n\n<p>3. How many DNS query response packets were captured?<\/p>\n\n\n\n<p>This refers to the Domain Name System protocol. We can see the total at the status bar.<\/p>\n\n\n\n<p><em>DNS Query: <\/em>When a client sends a DNS query to resolve a domain name, the response flag is 0.<\/p>\n\n\n\n<p><em>DNS Response<\/em>: When the DNS server replies to the query with the requested information (or an error), the response flag is set to 1.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"614\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-2.png\" alt=\"\" class=\"wp-image-671\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-2.png 940w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-2-300x196.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-2-768x502.png 768w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/figure>\n\n\n\n<p>4.What is the IP address of the host which sent the most number of bytes?<\/p>\n\n\n\n<p>Endpoint statistics can be used to identify the most active hosts on the network. To do this, go to the &#8220;Statistics&#8221; then select &#8220;Endpoints&#8221;. This will display a summary of the most active hosts, including their IP addresses, packet count, and byte count.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"359\" height=\"165\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-3.png\" alt=\"\" class=\"wp-image-672\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-3.png 359w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-3-300x138.png 300w\" sizes=\"auto, (max-width: 359px) 100vw, 359px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"257\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-4.png\" alt=\"\" class=\"wp-image-673\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-4.png 940w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-4-300x82.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-4-768x210.png 768w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong><em>Part 3: PCAP 2 Challenge<\/em><\/strong><\/p>\n\n\n\n<p>\ud83d\udd13This activity is more interesting as we trace, analyze, and assemble packets to capture passwords sent over the wire. Protocols like HTTP and FTP are insecure because they transmit data and authentication credentials in plain text without encryption.<\/p>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<p>1.What is the WebAdmin password?<\/p>\n\n\n\n<p>It\u2019s a filter that displays all TCP packets that contain a certain term , in this example we are looking for WebAdmin.<\/p>\n<\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"298\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-5.png\" alt=\"\" class=\"wp-image-674\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-5.png 940w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-5-300x95.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-5-768x243.png 768w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/figure>\n\n\n\n<p>The &#8220;Follow HTTP \/ TCP Stream&#8221; feature  lets you view and analyze the entire conversation between two endpoints over a TCP connection in a clear, readable format.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"564\" height=\"332\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-6.png\" alt=\"\" class=\"wp-image-675\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-6.png 564w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-6-300x177.png 300w\" sizes=\"auto, (max-width: 564px) 100vw, 564px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"392\" height=\"309\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-7.png\" alt=\"\" class=\"wp-image-676\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-7.png 392w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-7-300x236.png 300w\" sizes=\"auto, (max-width: 392px) 100vw, 392px\" \/><\/figure>\n\n\n\n<p>2.What is the version number of the attacker\u2019s FTP server?<\/p>\n\n\n\n<p>Search for \u201cftp\u201d on the filter toolbar to view the FTP conversation.To make it more readable, use the &#8220;Follow TCP Stream&#8221; feature.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"373\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-8.png\" alt=\"\" class=\"wp-image-677\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-8.png 940w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-8-300x119.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-8-768x305.png 768w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"445\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-9.png\" alt=\"\" class=\"wp-image-678\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-9.png 940w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-9-300x142.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-9-768x364.png 768w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/figure>\n\n\n\n<p>3.Which port was used to gain access to the victim Windows host?<\/p>\n\n\n\n<p>A series of ACK (acknowledgment) packets confirm a connection established at port 8081, then it indicates that port 8081 was used for the connection to the victim Windows host.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"284\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-10.png\" alt=\"\" class=\"wp-image-679\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-10.png 940w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-10-300x91.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-10-768x232.png 768w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/figure>\n\n\n\n<p>4.What is the name of a confidential file on the Windows host?<\/p>\n\n\n\n<p>To find a confidential file&#8217;s name on a Windows host, analyze the traffic or logs. The TCP stream will show the file with &#8220;confidential&#8221; in its name.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"947\" height=\"424\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-11.png\" alt=\"\" class=\"wp-image-680\" style=\"width:840px;height:auto\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-11.png 947w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-11-300x134.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-11-768x344.png 768w\" sizes=\"auto, (max-width: 947px) 100vw, 947px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"890\" height=\"871\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-12.png\" alt=\"\" class=\"wp-image-681\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-12.png 890w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-12-300x294.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-12-768x752.png 768w\" sizes=\"auto, (max-width: 890px) 100vw, 890px\" \/><\/figure>\n\n\n\n<p>5. What is the name of the log file that was created at 4:51 AM on the Windows host?<\/p>\n\n\n\n<p>Search for tcp contains &#8220;04:51&#8221; on filter toolbar then to analyze further, use the &#8220;Follow TCP Stream&#8221; feature.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"366\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-13.png\" alt=\"\" class=\"wp-image-682\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-13.png 940w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-13-300x117.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-13-768x299.png 768w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"866\" height=\"248\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-14.png\" alt=\"\" class=\"wp-image-683\" style=\"width:840px;height:auto\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-14.png 866w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-14-300x86.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-14-768x220.png 768w\" sizes=\"auto, (max-width: 866px) 100vw, 866px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"574\" height=\"733\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-15.png\" alt=\"\" class=\"wp-image-684\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-15.png 574w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/image-15-235x300.png 235w\" sizes=\"auto, (max-width: 574px) 100vw, 574px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong><em>Part 4: Additional Wireshark Filters<\/em><\/strong><\/p>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<p><strong>1. ip.addr == x.x.x.x<\/strong><\/p>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<p>   <strong>Filters packets to show only those where the IP address is either the source or destination address.<\/strong><\/p>\n\n\n\n<p><strong>2. ip.src == x.x.x.x<\/strong><\/p>\n\n\n\n<p>    <strong>Filters packets to show only those where the source IP address is x.x.x.x.<\/strong><\/p>\n\n\n\n<p><strong>3. ip.dst == x.x.x.x<\/strong><\/p>\n\n\n\n<p>    <strong>Filters packets to show only those where the destination IP address is x.x.x.x.<\/strong><\/p>\n\n\n\n<p><strong>4. ip.src == xxxx &amp;&amp; ip.dst == xxxx<\/strong><\/p>\n\n\n\n<p>    <strong>Filters packets where the source IP address is xxxx and the destination IP address is xxxx.<\/strong><\/p>\n\n\n\n<p><strong>5. tcp.port == xxx<\/strong><\/p>\n\n\n\n<p>    <strong>Filters packets to show only those where the TCP port number is xxx, either source or destination.<\/strong><\/p>\n\n\n\n<p><strong>6. tcp.flags.reset == 1<\/strong><\/p>\n\n\n\n<p>    <strong>Filters packets to show only those where the TCP RST (reset) flag is set to 1. <\/strong><\/p>\n\n\n\n<p>    <strong>This indicates that the connection was reset.<\/strong><\/p>\n\n\n\n<p><strong>7. tcp contains xxx<\/strong><\/p>\n\n\n\n<p>    <strong>Filters packets to show only those where the TCP payload contains the specified string <\/strong><\/p>\n\n\n\n<p>    <strong>or pattern xxx.<\/strong><\/p>\n\n\n\n<p><strong>8. !(arp or icmp or dns)<\/strong><\/p>\n\n\n\n<p>     <strong>Filters packets to exclude ARP, ICMP, and DNS protocols.<\/strong><\/p>\n\n\n\n<p><strong>9. udp contains xx:xx:xx<\/strong><\/p>\n\n\n\n<p>    <strong>Filters packets to show only those where the UDP payload contains the specified byte <\/strong><\/p>\n\n\n\n<p>     <strong>sequence xx:xx:xx.<\/strong><\/p>\n\n\n\n<p><strong>10. dns.flags.rcode != 0<\/strong><\/p>\n\n\n\n<p>     <strong>Filters DNS packets where the response code is not equal to 0. In DNS, a response code of 0<\/strong><\/p>\n\n\n\n<p>     <strong> indicates no error (success).<\/strong><\/p>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong><em>Part 5: Recommended Free Wireshark Resources!<\/em><\/strong><\/p>\n\n\n\n<p>     <strong>David Bombal : <\/strong><a href=\"https:\/\/youtube.com\/playlist?list=PLhfrWIlLOoKMBv50Y8NH6Dtfge_MrHYnl&amp;si=lUs8ZBNFC6cP5mI7\"><strong>Wireshark Ethical Hacking course<\/strong><\/a><\/p>\n\n\n\n<p>     <strong>Chris Greer\u00a0 : <\/strong><a href=\"https:\/\/youtube.com\/playlist?list=PLW8bTPfXNGdC5Co0VnBK1yVzAwSSphzpJ&amp;si=HhnHyA92VK9DoO8E\"><strong>Wireshark Masterclass<\/strong><\/a><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong><em>Conclusion: <\/em><\/strong><\/p>\n\n\n\n<p>As I continue to explore and learn how to use Wireshark, I\u2019m discovering several effective methods for finding and analyzing the information needed. Wireshark, as a powerful network protocol analyzer, offers a range of features that can be leveraged to understand network traffic in depth.<\/p>\n\n\n\n<p>May we all embrace continuous learning and remain passionate about growth. Happy exploring, God bless everyone!<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wireshark is an open-source network packet analyzer that allows you to see all the network traffic being transmitted (sent\/received) over a network. This tool is used to identify network problems, troubleshoot slow network issues, and analyze the data being transmitted over the network. The course includes two practical labs on analyzing PCAP files (packet captures). [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":790,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","site-transparent-header":"default","prose-style":"enable","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[12],"tags":[],"class_list":["post-662","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/662","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/comments?post=662"}],"version-history":[{"count":14,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/662\/revisions"}],"predecessor-version":[{"id":1333,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/662\/revisions\/1333"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/media\/790"}],"wp:attachment":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/media?parent=662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/categories?post=662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/tags?post=662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}