1 00:00:00,820 --> 00:00:04,420 ‫So let's have a look at the network sniffing methods first. 2 00:00:05,320 --> 00:00:11,140 ‫We're going to learn how to listen to the network traffic and how to use some tools, such as TCPDUMP 3 00:00:11,350 --> 00:00:12,250 ‫and Wireshark. 4 00:00:14,110 --> 00:00:19,780 ‫During the penetration test, we listen to the network traffic for many good reasons. 5 00:00:20,230 --> 00:00:27,460 ‫First of all, it's possible to obtain the clear text critical information such as usernames, passwords, 6 00:00:27,640 --> 00:00:29,620 ‫instant messages, emails and all that. 7 00:00:30,850 --> 00:00:33,880 ‫We can check to see if the scans were correctly. 8 00:00:34,780 --> 00:00:40,420 ‫And some controls can be seen by listening to the network interface, such as if the scan parameters 9 00:00:40,420 --> 00:00:46,840 ‫are set correctly, packets are properly exported from the network interface and responses are received. 10 00:00:48,040 --> 00:00:54,610 ‫Listening to the traffic using passive scan methods, we can collect information about IP addresses, 11 00:00:55,180 --> 00:01:02,000 ‫services running on server systems and protocols and technologies used in network infrastructures et 12 00:01:02,080 --> 00:01:02,610 ‫etc..