You need to learn TCP/IP. It's so much part of our life. Doesn't matter if you are studying for cybersecurity, or networking or something else. Learn TCP/IP.
// MENU // 00:00 ▶️ Intro 01:32 ▶️ The beginnings of TCP 03:57 ▶️ Three way handshake 07:20 ▶️ SYN meaning/explanation 08:50 ▶️ Port numbers 09:58 ▶️ What actually happens in the handshake 14:19 ▶️ Common starting TTL values 15:04 ▶️ Why we need SYN numbers 16:11 ▶️ What actually happens in the handshake (cont'd) 19:00 ▶️ Q&A (SYN,SYN-ACK,ACK - Sequence numbers - Increments - Tips) 33:01 ▶️ History of TCP 34:44 ▶️ TCP options 36:56 ▶️ TCP flags 41:53 ▶️ TCP Window - window size and scale 59:04 ▶️ MSS (Maximum Segment Size) 59:49 ▶️ SACK (Selective Acknowledgement) 01:00:13 ▶️ Conclusion
// SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
wireshark wireshark tcp packet analysis tcp tcp/ip ccna ccnp tcp handshake tcp syn tcp syn ack ccie tcp ip cisco ccna
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
What does a switch do with unknown unicast traffic? What happens to BUM traffic? Free software worth $200: https://goo.gl/613TUF
Ostinato - Network Traffic Generator Part 2. Easily create packets for testing in your GNS3 network.
Ostinato is a packet crafter, network traffic generator and analyzer with a friendly GUI. Also a powerful Python API for network test automation. Craft and send packets of several streams with different protocols at different rates. Think of it as “Wireshark in Reverse”.
...
https://www.youtube.com/watch?v=15ok9gyjGwA
Get these skills in 2021! Or at least get started.
Do you agree?
Need help? Join my Discord: https://discord.com/invite/usKSyzb
Menu:
Top skills for 2021:
Time to learn: 0:00
Ride waves: 0:20
My story 0:34
Career paths: 0:58
4 paths: 2:05
Top 5 skills: 3:27
Roadmap: 8:40
================
Connect with me:
================
Discord: http://discord.davidbombal.com
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
================
Support me:
================
Join thisisIT: https://bit.ly/thisisitccna
Or, buy my CCNA course and support me:
DavidBombal.com: CCNA ($10): http://bit.ly/yt999ccna
Udemy CCNA Course: https://bit.ly/ccnafor10dollars
GNS3 CCNA Course: CCNA ($10): https://bit.ly/gns3ccna10
======================
Special Offers:
======================
Cisco Press:
Link: bit.ly/ciscopress50
ITPro.TV:
https://itpro.tv/davidbombal
30% discount off all plans Code: DAVIDBOMBAL
Boson software: 15% discount
Link: bit.ly/boson15
Code: DBAF15P
linux
python
aws
azure
gcp
cloud
networking
ccna
ccnp
ccie
api
apis
vmware
docker
kubernetes
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#python #linux #aws
...
https://www.youtube.com/watch?v=QVdXrZcmaiM
You want to ride waves. You want to learn the hot new topics to get ahead - especially if you are starting out. Don't focus on the stuff of yesterday. Focus on the new opportunities. Ben Sadeghipour (NahamSec) shares his suggestions about what to learn and then tells us about one that is gaining a lot of momentum in 2022.
// MENU //
00:00 - Coming Up
00:29 - Intro
00:34 - The next big thing
02:09 - Opportunities in Web3
03:59 - Ride the wave
06:07 - Attack Vector & Attack Surface Management
11:39 - Going digital and digital assets
14:14 - NahamSec "Under 10 Minutes" series
15:51 - Patches that are still vulnerable
18:20 - APIs are the future
21:16 - Shodan demo
30:24 - The security issue
31:38 - Shodan vs ASM
32:38 - Out of scope assets
35:12 - NahamSec and Hadrian
38:12 - Will automation take over?
39:13 - ASM vs Inventory Management
40:49 - Getting more information about ASM
44:21 - Covering APIs on NahamSec YouTube
45:31 - Conclusion
// Connect with David //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
// Connect with NahamSec //
Twitter: https://twitter.com/nahamsec
YouTube: https://www.youtube.com/c/nahamsec
Github: https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
Discord: https://discord.com/invite/ysndAm8
Instagram: https://www.instagram.com/nahamsec/
LinkedIn: https://www.linkedin.com/in/nahamsec/
Twitch: https://www.twitch.tv/nahamsec
Website: https://nahamsec.com/
// Nahamsec's Udemy Course//
Udemy: https://www.udemy.com/course/intro-to-bug-bounty-by-nahamsec/
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
hack
hacker
shodan
cyber
hacking
cybersecurity
asm
rsa
attack surface management
attack vector
attack surface monitoring
attack surface reduction
bitcoin
api
apis
postman
hacking
hacking api
cyber security
information security
sans institute
cybersecurity training
cyber security training
information security training
privacy
nsa
oscp
ceh
bug bounty
bugbounty
hackerone
hacking
Ben Sadeghipour
NahamSec
nahamsec
cyber
security
bug bounties
ethical hacking
bug bounty hunting
burp suite
ethical hacker
Disclaimer: This video is for educational purposes only.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#cyber #hacking #jobs
...
https://www.youtube.com/watch?v=jPucxDfCk0k
Packet Tracer file (PT Version 7.1): https://goo.gl/iJg2cJ
Get the Packet Tracer course for only $10 by clicking here: https://goo.gl/vikgKN
Get my ICND1 and ICND2 courses for $10 here: https://goo.gl/XR1xm9 (you will get ICND2 as a free bonus when you buy the ICND1 course).
For lots more content, visit http://www.davidbombal.com - learn about GNS3, CCNA, Packet Tracer, Python, Ansible and much, much more.
#CCNA #PacketTracer #CCENT
The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links. PPP is comprised of three main components:
● A method for encapsulating multi-protocol datagrams.
● A Link Control Protocol (LCP) for establishing, configuring, and testing the data-link connection.
● A family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols.
The Challenge Handshake Authentication Protocol (CHAP) (defined in RFC 1994) verifies the identity of the peer by means of a three-way handshake. These are the general steps performed in CHAP:
After the LCP (Link Control Protocol) phase is complete, and CHAP is negotiated between both devices, the authenticator sends a challenge message to the peer.
The peer responds with a value calculated through a one-way hash function (Message Digest 5 (MD5)).
The authenticator checks the response against its own calculation of the expected hash value. If the values match, the authentication is successful. Otherwise, the connection is terminated.
This authentication method depends on a "secret" known only to the authenticator and the peer. The secret is not sent over the link. Although the authentication is only one-way, you can negotiate CHAP in both directions, with the help of the same secret set for mutual authentication.
For more information on the advantages and disadvantages of CHAP, refer to RFC 1994
Translation:
So in Customer Router 1
show ip route
at the moment shows us that we only see connected and local routes on the routing table.
So ip route default route looks like this.
Next hop is going to be 8.8.10.1
So show ip route
now shows us that we’ve got the default route in the routing table.
We now need to ping the Google DNS server which is 8.8.4.4
So ping 8.8.4.4
let’s see if that works, yes it does. So that’s good.
We also need to ping Cisco.com but that means we need to configure the main server to be the DNS server. So 8.8.4.4 and hopefully now we’ll be able to ping Cisco.com which we can.
In this packet tracer lab it’s resolving to the same IP address as the Google DNS server. But that’s ok. It proves that we’ve successfully configured things properly in our lab. I’ll save my configuration.
Again for the exam, you’re going to use co
...
https://www.youtube.com/watch?v=D1Ioxg_PoOY
Talking Sasquach shows us how to crack WPA2 WiFi passwords using a Flipper Zero, Marauder, Wireshark and Hashcat! A very cool demo.
Disclaimer: Only do attack networks that you own or have permission to attack.
// Flipper Zero and WiFi Dev Board //
Get a 5% discount using my affiliate link : https://lab401.com/r?id=42cm8b
and/or use code DAVIDBOMBAL
WiFi Dev Board: https://lab401.com/products/flipper-zero-wifi-devboard
Extreme Firmware: https://github.com/Flipper-XFW/Xtreme-Firmware
// Talking Sasquash SOCIAL //
YouTube: https://www.youtube.com/@TalkingSasquach
TikTok: https://www.tiktok.com/@talkingsasquach
Instagram: https://www.instagram.com/talking_sasquach/
Github: https://github.com/skizzophrenic
// David's SOCIAL //
Discord: https://discord.gg/davidbombal
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
// Youtube videos mentioned //
WiFi: https://youtu.be/subLBPJ3IxU?feature=shared
Clear Case: https://youtu.be/pLYcAfp5PMc?feature=shared
OMG Cable: https://youtu.be/n-HRqKWc4MY?feature=shared
ESP Flasher: https://youtu.be/Kme-yWL14N8?feature=shared
Dual Boot Evil Portal & Marauder: https://youtu.be/jCPWlS5JmlY?feature=shared
// MENU //
00:00 - Hacking WiFi with a Flipper Zero
00:42 - The Talking Sasquach
01:56 - Flipper Zero WiFi hacking
03:28 - Demo" Flipper Zero WiFi hacking
11:04 - "Flipper Zero is a great way to learn"
13:23 - Talking Sasquach tutorials on YouTube
13:56 - Conclusion
flipper zero
flipper
flipperzero
wifi
wireshark
hashcat
hack
hacking
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#wifi #flipperzero #hacking
...
https://www.youtube.com/watch?v=F5iiwounbzY
Packet Tracer file (PT Version 7.1): https://goo.gl/twE2R2
Get the Packet Tracer course for only $10 by clicking here: https://goo.gl/vikgKN
Get my ICND1 and ICND2 courses for $10 here: https://goo.gl/XR1xm9 (you will get ICND2 as a free bonus when you buy the ICND1 course).
For lots more content, visit http://www.davidbombal.com - learn about GNS3, CCNA, Packet Tracer, Python, Ansible and much, much more.
#CCNA #PacketTracer #CCENT
QoS is the measure of transmission quality and service availability of a network (or internetworks).
Service availability is a crucial foundation element of QoS. The network infrastructure must be designed to be highly available before you can successfully implement QoS. The target for High Availability is 99.999 % uptime, with only five minutes of downtime permitted per year. The transmission quality of the network is determined by the following factors:
•Loss—A relative measure of the number of packets that were not received compared to the total number of packets transmitted. Loss is typically a function of availability. If the network is Highly Available, then loss during periods of non-congestion would be essentially zero. During periods of congestion, however, QoS mechanisms can determine which packets are more suitable to be selectively dropped to alleviate the congestion.
•Delay—The finite amount of time it takes a packet to reach the receiving endpoint after being transmitted from the sending endpoint. In the case of voice, this is the amount of time it takes for a sound to travel from the speaker’s mouth to a listener’s ear.
•Delay variation (Jitter)—The difference in the end-to-end delay between packets. For example, if one packet requires 100 ms to traverse the network from the source endpoint to the destination endpoint and the following packet requires 125 ms to make the same trip, then the delay variation is 25 ms.
Each end station in a Voice over IP (VoIP) or Video over IP conversation uses a jitter buffer to smooth out changes in the arrival times of voice data packets. Although jitter buffers are dynamic and adaptive, they may not be able to compensate for instantaneous changes in arrival times of packets. This can lead to jitter buffer over-runs and under-runs, both of which result in an audible degradation of call quality.
Translation:
Okay in this lab, we need to implement quality of service.
Let’s have a look at router 1.
On router 1, enter password of cisco type show run
We can see some configuration on the router but there is no quality of service configuration on the router.
So as an example, on this interface, no service policy has been applied. We don’t see any class maps or we don’t see any policy maps on the router.
So conf t we’re told that we need to ma
...
https://www.youtube.com/watch?v=uqtTgj9X-GU
This is part of my series "Building insane (large scale) GNS3 networks". I plan to continue adding more and more devices to the topology until..... well.... until I am done.
...
https://www.youtube.com/watch?v=6D_IF3R-tfU
Packet Tracer file (PT Version 7.1) : https://goo.gl/tmRBKB
Get the Packet Tracer course for only $10 by clicking here: https://goo.gl/vikgKN
Get my ICND1 and ICND2 courses for $10 here: https://goo.gl/XR1xm9 (you will get ICND2 as a free bonus when you buy the ICND1 course).
#CCNA #PacketTracer #CCENT
Can you perform a password recovery and restore the device configurations?
Details of the Password Recovery Procedure
Perform the following steps to recover or replace a lost enable, enable secret, or console login password:
Troubleshooting Guide for the Cisco 4000 Series Integrated Services Router:
https://www.cisco.com/c/en/us/td/docs/routers/access/4400/troubleshooting/guide/isr4400trbl/isr4400trbl02.html
Catalyst 3560 Software Configuration Guide, Release 12.2(52)SE:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_52_se/configuration/guide/3560scg/swtrbl.html#wp1021182
Transcription:
This link here explains how to reset passwords on a Cisco 3560 switch.
So how do we recover a lost or forgotten password on a 3560 switch?
There are two options: One, when password recovery is enabled and one when it’s disabled.
In our example we have a default configuration where password recovery is permitted. So we need to connect to the console of the device.
Now in packet tracer we can either do that by dragging a PC into the topology and then connecting it via a console cable. So I could connect to the console of the switch and have a look. At the switch directly through the console password here is unknown. I’m not going to do it that way. I’m simply going to click on the device which gives me a console connection anyway.
But please be aware that in the real world, you need to physically connect a PC to the console of your switch or router when doing password recovery.
Now the next step is to make sure that you’re using 9,600 bits per second in your terminal emulation software, that’s the default in packet tracer. We need to power the off the switch and then reconnect the power cord and then within 15 seconds press the mode button while the system LED is still flashing green. Continue pressing the mode button until the system LED turns briefly amber and then solid green and then release the mode button.
Now in my example, I can’t physically unplug the power through packet tracer. So I’m going to power cycle the devices that power cycles all the devices but I’ve already reset the configuration of my routers so that’s fine. I’m going to press the mode button on the switch which then allows me to access ROM on under the switch.
And now some tips, if that doesn’t work, power cycle device and then click the mode button two or three times, to get packet tracer to take you to ROM m
...
https://www.youtube.com/watch?v=IwUlnxvTUU8