1 00:00:04,939 --> 00:00:09,260 In this course, we are mainly using Cisco Packet Tracer to simulate networks. 2 00:00:09,260 --> 00:00:12,380 Cisco Packet Tracer is fantastic software. 3 00:00:12,410 --> 00:00:15,380 It allows us to simulate all kinds of networks. 4 00:00:15,380 --> 00:00:21,800 We can simulate routers, we can simulate switches, we can simulate wireless access points, wireless 5 00:00:21,980 --> 00:00:28,580 LAN controllers, all kinds of devices can be simulated using Cisco packet tracer, but it's a simulator. 6 00:00:28,580 --> 00:00:32,840 It doesn't actually show us what's happening in a real network. 7 00:00:32,960 --> 00:00:35,150 It gets us a long way there. 8 00:00:35,150 --> 00:00:38,870 Fantastic software for building virtual networks on your laptop. 9 00:00:38,870 --> 00:00:44,450 But if you really want to see what's actually happening on a network, you need to use something like 10 00:00:44,450 --> 00:00:45,470 Wireshark. 11 00:00:45,470 --> 00:00:52,460 So in this course, I'm going to show you why Shock Captures and we're going to dig deep into the packets. 12 00:00:52,460 --> 00:00:57,770 We're going to look at applications such as HTTP, FTP and others. 13 00:00:57,770 --> 00:01:04,280 I'm going to show you how you can capture passwords off the wire or off the air if you're using a wireless 14 00:01:04,280 --> 00:01:04,910 network. 15 00:01:04,910 --> 00:01:09,260 So basically, Wireshark is what's called a protocol analyzer. 16 00:01:09,260 --> 00:01:16,640 It captures traffic off the wire and allows you to view packets that have been sent by either your device 17 00:01:16,640 --> 00:01:17,990 or other devices. 18 00:01:17,990 --> 00:01:26,360 If you use a mode called promiscuous mode, basically, Wireshark is a fantastic tool that network engineers 19 00:01:26,360 --> 00:01:30,650 use to analyze networks and find out if they're problems on a network. 20 00:01:33,440 --> 00:01:36,680 In this example, it's going to be voice over IP traffic. 21 00:01:36,680 --> 00:01:43,850 In other words, we're going to capture traffic between virtual phones as shown here, as well as virtual 22 00:01:43,850 --> 00:01:45,680 phones and physical phones. 23 00:01:45,890 --> 00:01:50,990 I'm going to make calls between these two phones and then we're going to capture the traffic and then 24 00:01:50,990 --> 00:01:53,210 replay the voice call. 25 00:01:53,210 --> 00:01:55,580 And we're going to use Wireshark for that. 26 00:01:55,670 --> 00:01:57,080 This is my second call. 27 00:01:58,190 --> 00:02:03,260 David Bumble speaking to himself, click play streams. 28 00:02:03,800 --> 00:02:05,600 And there's our voice call. 29 00:02:06,730 --> 00:02:08,020 This is my second call. 30 00:02:09,220 --> 00:02:12,310 David Bono's speaking to himself. 31 00:02:12,330 --> 00:02:18,400 Himself now to make it easier for you rather than you trying to build some of the networks that I've 32 00:02:18,400 --> 00:02:19,750 created in this course. 33 00:02:19,750 --> 00:02:24,690 I've captured the packets in Wireshark and I've attached them to the course. 34 00:02:24,700 --> 00:02:31,060 So all you need to do is download the Wireshark captures, and then you can follow along and follow 35 00:02:31,060 --> 00:02:31,870 what I'm doing. 36 00:02:31,870 --> 00:02:37,660 So you can actually try this yourself rather than trying to build a whole network, capture the packets 37 00:02:37,660 --> 00:02:39,400 and then try and follow along. 38 00:02:39,400 --> 00:02:41,890 You can simply download the Wireshark captures. 39 00:02:41,890 --> 00:02:43,840 So I've made this a lot easier for you. 40 00:02:43,870 --> 00:02:47,970 Just download the Wireshark captures and then you can try this yourself. 41 00:02:47,980 --> 00:02:54,010 Now obviously if you want to try this in your networks, either at home or in the office and so forth, 42 00:02:54,010 --> 00:02:55,270 but be careful. 43 00:02:55,810 --> 00:03:01,450 You need to have permission to capture traffic, especially if you're going to be capturing passwords. 44 00:03:01,450 --> 00:03:05,620 So don't just go and capture any traffic anywhere you could land in trouble. 45 00:03:05,620 --> 00:03:10,240 So make sure that you have permission to capture the packets of a network if it's not your own private 46 00:03:10,240 --> 00:03:10,960 network. 47 00:03:11,080 --> 00:03:11,390 Okay. 48 00:03:11,410 --> 00:03:17,020 So in the next video, I'm going to show you how to download Wireshark, how to install it on a Windows 49 00:03:17,020 --> 00:03:17,650 computer. 50 00:03:17,650 --> 00:03:20,110 And I'll also show you how to install it on a mac. 51 00:03:20,110 --> 00:03:22,180 And then I'm going to show you how to interpret. 52 00:03:22,180 --> 00:03:24,910 Wireshark captures really important skill to have. 53 00:03:24,940 --> 00:03:28,900 It's important that you know how to read Wireshark captures. 54 00:03:28,900 --> 00:03:30,760 So I'm introducing this now. 55 00:03:30,760 --> 00:03:32,350 It's quite a complex topic. 56 00:03:32,350 --> 00:03:33,670 You may struggle now. 57 00:03:33,670 --> 00:03:39,460 Please don't worry if you struggle initially, all of us initially struggle with new technologies. 58 00:03:39,490 --> 00:03:43,240 Keep on studying, keep on learning, do the labs. 59 00:03:43,240 --> 00:03:45,550 That's probably the best advice I can give you. 60 00:03:45,880 --> 00:03:49,120 Keep on trying, keep on learning, and you'll get it. 61 00:03:49,690 --> 00:03:51,940 Okay, so that's enough said about Wireshark. 62 00:03:51,940 --> 00:03:55,300 In the next video, I'm going to show you how to download and install Wireshark.