Ethical Hacking and Network Analysis with Wireshark

Learn ethical hacking with Wireshark to protect networks, upgrade your skills, and stay ahead in cybersecurity through hands-on, interactive lessons. 

(NA-WIRSHRK.AW1) / ISBN : 978-1-64459-681-4
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

About This Course

Enroll in our Wireshark Ethical Hacking Course to master network analysis, detect cyber threats, and secure systems.

In this course, dive into packet sniffing, protocol analysis, and ethical hacking techniques using Wireshark, the industry’s top network tool. Learn to capture wireless traffic, decrypt SSL/TLS, analyze VoIP calls, and uncover hidden vulnerabilities before hackers do.

From troubleshooting connectivity issues to detecting cyberattacks, you’ll get hands-on practice with real-world exercises.

Skills You’ll Get

  • Master Wireshark: Navigate its interface, capture live traffic, and analyze packets.
  • Detect Cyber Threats: Identify attacks like port scanning, DDoS, ARP poisoning, and brute-force attempts.
  • Decrypt & Analyze Traffic: Uncover vulnerabilities in SSL/TLS, HTTP, VoIP, and IoT communications.
  • Sniff Sensitive Data: Extract credentials, files, and network secrets from captured traffic.
  • Optimize & Troubleshoot Networks: Fix connectivity issues, improve performance, and resolve protocol errors.
  • Secure Networks: Use ethical hacking techniques to find weaknesses before attackers do.

1

Introduction

2

Ethical Hacking and Networking Concepts

  • Introduction
  • Introduction to ethical hacking
  • Introduction to networking concepts
  • The OSI model
  • The TCP/IP model
  • IP networks and subnets
  • Switching and routing packets
  • WAN links
  • Wireless networking
  • What is network traffic
  • Overview of network packet sniffing 
  • Active and passive sniffing
  • Wireshark in ethical hacking and traffic analysis 
  • Conclusion
3

Getting Acquainted with Wireshark and Setting up the Environment

  • Introduction
  • What is Wireshark
  • Downloading and Installing Wireshark with Libraries 
  • Exploring the Wireshark user interface
  • Conclusion
4

Getting Started with Packet Sniffing

  • Introduction
  • Define your sniffing targets 
  • Choosing network interfaces 
  • Performing a packet sniffing
  • Remote network packet 
  • Display and capture filters
  • Maximizing packet capture performance
  • Stop sniffing, saving, and exporting packets
  • Challenges/limitations of packet capturing
  • Conclusion
5

Sniffing on 802.11 Wireless Networks

  • Introduction
  • 802.11 wireless networks
  • 802.11 wireless network architecture
  • 802.11 packet structure
  • Wireless card modes
  • Difference between monitor mode and promiscuous mode
  • WLAN capture setup
  • Sniffing WLAN Network Traffic
  • Wi-Fi sniffer: WPA/WPA2 
  • 802.11 Sniffer Capture Analysis: Multicast
  • 802.11 Sniffer Capture Analysis: Web authentication
  • Challenges of sniffing 802.11 wireless networks 
  • Conclusion 
6

Sniffing Sensitive Information, Credentials and Files

  • Introduction
  • Sniffing the activity over USB interfaces
  • Capturing credentials on HTTP
  • Extracting images from PCAP file using Wireshark
  • PDF and ZIP files saving from Wireshark
  • Capturing Telnet password
  • Capturing SMTP password
  • Identifying hosts and users with Wireshark
  • Conclusion
7

Analyzing Network Traffic Based on Protocols

  • Introduction
  • IPv4 and IPv6
  • ARP
  • ICMP
  • TCP
  • UDP
  • HTTP
  • FTP
  • SMTP
  • DHCPv6
  • DNS
  • Conclusion
8

Analyzing and Decrypting SSL/TLS Traffic

  • Introduction
  • Introduction to SSL/TLS
  • The SSL/TLS Handshake
  • Key exchange
  • Decrypting SSL/TLS traffic using Wireshark
  • Conclusion
9

Analyzing Enterprise Applications

  • Introduction
  • Identifying the service running over the network
  • Analyzing Microsoft Terminal Server and Citrix communications
  • Analyzing the database traffic
  • Analyzing SNMP traffic
  • Conclusion 
10

Analysing VoIP Calls Using Wireshark

  • Introduction
  • Introduction to VoIP technology
  • VoIP architecture
  • Working of VoIP
  • VoIP supporting protocols
  • Sniffing VoIP traffic
  • SIP call analysis
  • Analysing RTP Streams in VoIP Traffic 
  • Challenges/limitations in analyzing VoIP calls through Wireshark
  • Conclusion
11

Analyzing Traffic of IoT Devices

  • Introduction
  • Introduction to IoT
  • IoT devices: Use cases for network sniffing
  • Sniffing traffic of IoT devices
  • Analyzing traffic of IoT devices
  • Conclusion
12

Detecting Network Attacks with Wireshark

  • Introduction
  • Detecting suspicious network traffic patterns
  • Detecting port scanning 
  • Detecting Denial of Service and Distributed Denial of Service attacks
  • Detecting Brute-force and application attacks
  • Detecting ARP poisoning
  • Detecting session hijacking
  • Detecting honeypot traffic
  • Detecting Heartbleed bug
  • Challenges/limitations of analysis of network attacks using Wireshark
  • Conclusion
13

Troubleshooting and Performance Analysis Using Wireshark

  • Introduction
  • Troubleshooting methodology
  • Troubleshooting connectivity issues
  • Troubleshooting functional issues
  • Performance analysis methodology
  • Troubleshooting TCP protocol issues
  • Troubleshooting slow application response time
  • Conclusion

Any questions?
Check out the FAQs

  Want to Learn More?

Contact Us Now

Wireshark is a free, open-source network protocol analyzer used in ethical hacking to:

  • Capture and inspect live traffic (e.g., HTTP, VoIP, DNS).
  • Detect vulnerabilities like unencrypted passwords or misconfigured protocols.
  • Network Analysis (e.g., ARP spoofing, DDoS) by examining packet behavior.
  • Troubleshoot networks by identifying latency, dropped packets, or misrouted data.

This Wireshark hands-on course covers sniffing sensitive data, decrypting SSL/TLS, and mapping network traffic to identify weak points. Please note that ethical hackers must always obtain permission before using Wireshark. 

Yes, but only with proper authorization. Unauthorized packet sniffing is illegal. 

  • Wireshark → GUI-based, advanced filtering, deep packet analysis (best for detailed inspection).
  • tcpdump → CLI-only, lightweight, script-friendly (best for quick captures on servers).

Both capture packets, but Wireshark is more user-friendly for network analysis.

Master Ethical Hacking with Wireshark

  Develop your cybersecurity skills while you sniff, analyze, and secure networks in this Wireshark Ethical Hacking Course.

$279.99

Buy Now

Related Courses

All Course
scroll to top