Linux serverlinux web serverNETWORK ADMINISTRATIONS

Networking for Hackers and Cybersecurity professionals (How long until you learn something new?)

Let’s play a game. How long does it take you to learn something new in this video?

// YouTube VIDEOS mentioned //
Decrypting TLS HTTP/2 and QUIC with Wireshark: https://youtu.be/yodDbgoCnLM

// YouTube PLAYLIST //
Wireshark with Chris Greer: https://www.youtube.com/watch?v=rmFX1V49K8U&list=PLhfrWIlLOoKO8522T1OAhR5Bb2mD6Qy_l&pp=iAQB

// David SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/@davidbombal

// MY STUFF //
https://www.amazon.com/shop/davidbombal

// MENU //
00:00 – Introduction
00:28 – My Setup
00:43 – Do You Know?
01:26 – Start of Demonstration with Telnet
03:54 – Port Numbers Further Explained
04:55 – Using Apache2
06:29 – How Are Port Numbers Assigned?
08:39 – Ephemeral Ports
10:42 – Using Fing
11:34 – Restarting Apache2 and Denying TCP
15:54 – Which Port Numbers to Clients Actually Use?
17:46 – On Ubuntu
19:01 – Theory vs Reality
23:37 – Difference Between Port Number and Socket
26:07 – Demonstration Continued
29:04 – What You’ve Learned So Far
29:54 – One Last Demonstration
32:34 – Conclusion and Outro

// Detailed MENU //
00:00:00 – Introduction to the Game
– David introduces a game where viewers comment on the timestamp or topic where they learn something new.

00:00:11 – Importance of Port Numbers
– Emphasis on understanding port numbers for those interested in cybersecurity, networking, or other fields.

00:00:24 – Network Setup
– David describes the network setup involving Kali Linux, Cisco routers, a Windows computer, and mobile devices.

00:00:48- Understanding Ports and Sockets
– Queries about the difference between port numbers and sockets, and their relevance in TCP/IP.

00:01:28 – Demonstration with PuTTY and Telnet
– A practical demonstration using PuTTY and Telnet to connect to a specific port on a Cisco router.

00:03:04 – Character Generator Protocol (CHARGEN) Discussion
– Explaining CHARGEN Protocol and its historical significance.

00:03:11 – Disabling TCP Small Services and Testing Connection Refusal
– The process of disabling TCP small services on a router and testing the impact on connectivity.

00:04:01 – Kali Linux Server Setup and Apache Service Start
– Setting up a server on Kali Linux and starting the Apache service.

00:05:09 – Analyzing Network Traffic with Wireshark
– Using Wireshark to analyze traffic and understand port numbers in network communications.

00:06:39 – Understanding IANA Port Numbers and Ephemeral Ports
– A look at IANA’s list of port numbers and an explanation of ephemeral ports.

00:07:54 – FCs and Operating System Differences in Port Usage
– Discussing RFCs and how different operating systems use various port ranges.

00:08:54 – Testing Port Accessibility with Mobile Devices
– Using mobile devices to test the accessibility of ports on a network.

00:11:38 – Implementing Access Lists on Cisco Router
– Creating and modifying access lists on a Cisco router to control network traffic.

00:14:06 – Difference Between Port Numbers and Sockets
– Explaining the conceptual difference between port numbers and sockets.

00:16:00 – Demonstrating SSH Connections and Port Usage
– Demonstrating SSH connections from different devices and analyzing the port usage.

00:18:03 – Blocking SSH Traffic with Access Lists
– Blocking SSH traffic using access lists on a router and observing the effects.

00:21:37 – Discussion on DNS Protocol and Traffic Blocking
– Discussion on DNS protocols and the impact of blocking DNS traffic with access lists.

00:27:41 – Exploring HTTPS and QUIC Protocols with Browser Examples
– Exploring HTTPS and QUIC protocols using various web browsers and analyzing network traffic.

00:32:11 – Conclusion and Future Content Ideas
– Concluding remarks and thoughts on future networking-related content.

kali linux
linux
nmap
ssl
http
https
ssh
telnet
chargen
port
port numbers
wireshark

#kalilinux #cybersecurity #hacker

source

by David Bombal

linux web server

28 thoughts on “Networking for Hackers and Cybersecurity professionals (How long until you learn something new?)

  • Let's play a game. How long does it take you to learn something new in this video?

    // YouTube VIDEOS mentioned //
    Decrypting TLS HTTP/2 and QUIC with Wireshark: https://youtu.be/yodDbgoCnLM

    // YouTube PLAYLIST //
    Wireshark with Chris Greer: https://www.youtube.com/watch?v=rmFX1V49K8U&list=PLhfrWIlLOoKO8522T1OAhR5Bb2mD6Qy_l&pp=iAQB

    // David SOCIAL //
    Discord: https://discord.com/invite/usKSyzb
    Twitter: https://www.twitter.com/davidbombal
    Instagram: https://www.instagram.com/davidbombal
    LinkedIn: https://www.linkedin.com/in/davidbombal
    Facebook: https://www.facebook.com/davidbombal.co
    TikTok: http://tiktok.com/@davidbombal
    YouTube: https://www.youtube.com/@davidbombal

    // MY STUFF //
    https://www.amazon.com/shop/davidbombal

    // MENU //
    00:00 – Introduction
    00:28 – My Setup
    00:43 – Do You Know?
    01:26 – Start of Demonstration with Telnet
    03:54 – Port Numbers Further Explained
    04:55 – Using Apache2
    06:29 – How Are Port Numbers Assigned?
    08:39 – Ephemeral Ports
    10:42 – Using Fing
    11:34 – Restarting Apache2 and Denying TCP
    15:54 – Which Port Numbers to Clients Actually Use?
    17:46 – On Ubuntu
    19:01 – Theory vs Reality
    23:37 – Difference Between Port Number and Socket
    26:07 – Demonstration Continued
    29:04 – What You've Learned So Far
    29:54 – One Last Demonstration
    32:34 – Conclusion and Outro

    // Detailed MENU //
    00:00:00 – Introduction to the Game
    – David introduces a game where viewers comment on the timestamp or topic where they learn something new.

    00:00:11 – Importance of Port Numbers
    – Emphasis on understanding port numbers for those interested in cybersecurity, networking, or other fields.

    00:00:24 – Network Setup
    – David describes the network setup involving Kali Linux, Cisco routers, a Windows computer, and mobile devices.

    00:00:48– Understanding Ports and Sockets
    – Queries about the difference between port numbers and sockets, and their relevance in TCP/IP.

    00:01:28 – Demonstration with PuTTY and Telnet
    – A practical demonstration using PuTTY and Telnet to connect to a specific port on a Cisco router.

    00:03:04 – Character Generator Protocol (CHARGEN) Discussion
    – Explaining CHARGEN Protocol and its historical significance.

    00:03:11 – Disabling TCP Small Services and Testing Connection Refusal
    – The process of disabling TCP small services on a router and testing the impact on connectivity.

    00:04:01 – Kali Linux Server Setup and Apache Service Start
    – Setting up a server on Kali Linux and starting the Apache service.

    00:05:09 – Analyzing Network Traffic with Wireshark
    – Using Wireshark to analyze traffic and understand port numbers in network communications.

    00:06:39 – Understanding IANA Port Numbers and Ephemeral Ports
    – A look at IANA's list of port numbers and an explanation of ephemeral ports.

    00:07:54 – FCs and Operating System Differences in Port Usage
    – Discussing RFCs and how different operating systems use various port ranges.

    00:08:54 – Testing Port Accessibility with Mobile Devices
    – Using mobile devices to test the accessibility of ports on a network.

    00:11:38 – Implementing Access Lists on Cisco Router
    – Creating and modifying access lists on a Cisco router to control network traffic.

    00:14:06 – Difference Between Port Numbers and Sockets
    – Explaining the conceptual difference between port numbers and sockets.

    00:16:00 – Demonstrating SSH Connections and Port Usage
    – Demonstrating SSH connections from different devices and analyzing the port usage.

    00:18:03 – Blocking SSH Traffic with Access Lists
    – Blocking SSH traffic using access lists on a router and observing the effects.

    00:21:37 – Discussion on DNS Protocol and Traffic Blocking
    – Discussion on DNS protocols and the impact of blocking DNS traffic with access lists.

    00:27:41 – Exploring HTTPS and QUIC Protocols with Browser Examples
    – Exploring HTTPS and QUIC protocols using various web browsers and analyzing network traffic.

    00:32:11 – Conclusion and Future Content Ideas
    – Concluding remarks and thoughts on future networking-related content.

    kali linux
    linux
    nmap
    ssl
    http
    https
    ssh
    telnet
    chargen
    port
    port numbers
    wireshark

  • one oh tuuu hehe like the accent when you say two 😀 it's more like tuuuu 😀

  • Immediately. This entire video is amazing. This is so informative. One thing that i am struggling a bit is what services listens on what port numbers (Remembering this, but i guess this is age related)
    . Thanks David for the IANA link

  • Can I use a low end laptop for hacking and buy an external gpu as I get into password cracking. Will external gpu lower performance? Is it worth it or should I buy a completely new laptop with a powerful gpu for password cracking?

  • thanks @davidbombal , it's interesting but I got lost… i will replay the video, I am just beginner…😁

  • thousand usdt box

    BPD5DZCQVO

    Twenty Sheba boxes

    BP7BA09NNL

    ألف صندوق usdt

    BPD5DZCQVO

    عشرين صندوق شيبا

    BP7BA09NNL

  • I'm going too need a bookstore cross reference suggestion or an oriented directory of extra homework a by-product selections dept.
    I understand some of it ?
    …Means I'm behind in the process of language ID. Mainline streamlining.
    …Library of people inside the optimizers.

  • Clear and articulate language, super professional production and above all very didactic explanations. David is a real crack

  • 1:00 – I learned that I don't know the difference between a socket and a port.

  • Hello David. Once again very rich content. Thank you for showing me the difference between a port and a socket. Here you actually did practically show us how to use ports in networking. What about practical uses of sockets too? Equally, I just discovered the app called Fing thanks to you. I am truly grateful. Great video you just did for us beginners. God bless you.

  • At least I learned something new, this video needs focus🧐☃️🌲 happy Christmas David bombal ⚡😋

Comments are closed.