Files Included :
1 Concepts of TCPIP (218.61 MB)
2 Part of the Bigger Picture (251 MB)
3 Different parts of TCPIP (176.82 MB)
4 Were do we Get These Packets From (326.2 MB)
5 Replay the Traffic (110.02 MB)
6 Learning Binary and Hex (136.76 MB)
supplemental files (455.56 KB)
1 IPv6 (34.13 MB)
2 Identifying IPv6 (149.85 MB)
3 IPv6 Communication (219.51 MB)
4 IPv6 Addressing (230.58 MB)
5 Where is IPv6 in our Packet (100.36 MB)
6 Packet Examples (459.06 MB)
1 IPv4 (55.22 MB)
2 Identifying IPv4 (132.48 MB)
3 IPv4 Communication (267.53 MB)
4 IPv4 Addressing (323.89 MB)
5 Where is IPv4 in our Packet (410.96 MB)
6 Packet Examples (164.34 MB)
1 Wireshark Display Filters (35.9 MB)
2 To the Boolean-Mobile! (279.41 MB)
3 Knowing the Basic Filters (170.87 MB)
4 Expanding on Basic Filters (293.25 MB)
5 Syntax is Everything (340.95 MB)
6 Apply Filtering to Live Capture (192.03 MB)
1 Layer 4 and Beyond (87.83 MB)
2 Pen to Paper (319.9 MB)
3 DNS (309.01 MB)
4 Microsoft Protocols (268.52 MB)
5 HTTP (316.55 MB)
1 Advanced Wireshark (38.21 MB)
2 Magic Numbers (344.55 MB)
3 Regular Expressions (251.26 MB)
4 BPF Filtering (283.52 MB)
5 Supplemental Material (409.25 MB)
1 Introduction to Suricata (99.66 MB)
2 Installing Suricata (299.44 MB)
3 Continuing our Install (210.59 MB)
4 Setting up Suricata (413.28 MB)
5 Rule Configuration (383.13 MB)
1 DNS (137.18 MB)
2 Identifying DNS (231.61 MB)
3 DNS Communication (261.63 MB)
4 DNS Addressing (193.85 MB)
5 Where is DNS in our packet (320.29 MB)
6 Packet Examples (183.35 MB)
1 Microsoft Protocols (110.35 MB)
2 NETBIOS (382.74 MB)
3 LDAP (203.5 MB)
4 RDP (223.26 MB)
5 Kerberos (268.37 MB)
6 SMB (342.32 MB)
7 RPC (244.24 MB)
1 Modern HTTP (42.18 MB)
2 HTTP Basics (146.62 MB)
3 HTTP Delivery (147.05 MB)
4 Understanding HTTP on the Network (363.84 MB)
5 Files From Within (390.95 MB)
6 Looking for Web Traffic (234.25 MB)
1 Real-world Applications (64.33 MB)
2 Solarwinds (291.01 MB)
3 Starting up our Solarwinds (380.84 MB)
4 Basic Configurations (385.45 MB)
5 Adding a Log Source (347.55 MB)
1 Introduction to Wireshark (30.63 MB)
2 Uses of Wireshark (198.93 MB)
3 Being Promiscuous (318.15 MB)
4 Saving our Work for Later (273.8 MB)
5 Exporting Things From Wireshark (390.9 MB)
6 Filtering Results (266.01 MB)
1 How to Research a Protocol (72.7 MB)
2 There's something strange, and it don't look good. (283.3 MB)
3 Requesting a comment (222.33 MB)
4 Tying in the Results to our Packets (388.75 MB)
5 What is this Protocol Used for (383.79 MB)
6 Other Protocols Moving Forward (100.35 MB)
1 Scapy (55.11 MB)
2 What is Scapy (174.96 MB)
3 Installing Scapy (335.7 MB)
4 Crafting with Scapy (256.89 MB)
5 Making Our Packets Look Legit (267.34 MB)
6 What's the real purpose of Scapy (204.7 MB)
1 Snort (140.76 MB)
2 What is Snort (272.61 MB)
3 Installing Snort (272.36 MB)
4 Setting up Snort (390.34 MB)
5 Configuring Some Rules (200.8 MB)
6 Security Considerations (228.71 MB)
1 Burp Suite (89.06 MB)
2 Getting the Software (261.12 MB)
3 Configuration of Burp Suite (288.52 MB)
4 Crawling Around (389.9 MB)
5 Burp Suite Detection (339.96 MB)
1 Introduction to Network Forensic Analysis (84.81 MB)
2 Who Owns What (313.46 MB)
3 Finding Our Practice (288.29 MB)
4 Starting Our Practice (571.47 MB)
5 Checking Our Results (110.95 MB)
1 Zeek (Bro) (63.01 MB)
2 Zeek Installation (271.86 MB)
3 Some of the Basics (276.91 MB)
4 Running Zeek (277.3 MB)
5 Examining the Results (499.77 MB)
6 Practice at Home (160.46 MB)
1 Network Architecture (84.77 MB)
2 The Internal Network (168.19 MB)
3 The External Network (282.14 MB)
4 Mapping out the Cloud (263.27 MB)
5 Putting Pen to Paper (348.81 MB)
6 Let's Review (205.51 MB)
1 Introduction to Network Monitoring at Scale (131.67 MB)
2 Understanding the Network (224.52 MB)
3 Solarwinds (Again) (424.33 MB)
4 Monitoring with Solarwinds (469.9 MB)
5 Other Network Monitoring Options (414.3 MB)
1 IDS and IPS Evasion Theory (72.26 MB)
2 Understanding What Evasion Actually Is (282.7 MB)
3 Fragmentation (304.76 MB)
4 Spoofing (309.44 MB)
5 Sledding Past the IDSIPS (345.71 MB)
6 Forging a Signature (270.44 MB)
1 Threat Hunting and Visualization (57.62 MB)
2 What is a Netflow (134.55 MB)
3 Examining a Netflow (210.43 MB)
4 Replaying the Traffic (368.48 MB)
5 Is It Something Bad (284.73 MB)
6 Stress Testing Our Packet Captures (210.76 MB)
7 Let's Review (110.62 MB)
1 UNIX Command Line Processing (83.59 MB)
2 Why UNIX (328.74 MB)
3 Network Analysis on POSIX-based Systems (274.93 MB)
4 Burpsuite (315.02 MB)
5 sslstrip (247.61 MB)
6 Back to the Field. Manual (154.84 MB)
1 Network Access Link Layer 2 (37.71 MB)
2 Identifying Layer 2 (207.15 MB)
3 Layer 2 Communication (350.59 MB)
4 Using Layer 2 as a Forwarding Address (326.55 MB)
5 Where is Layer 2 in our Packet (201.96 MB)
6 Packet Examples (189.04 MB)
1 IP Link Layer 3 (37.05 MB)
2 Identifying Layer 3 (223.54 MB)
3 Layer 3 Communication (315.66 MB)
4 Using Layer 3 as a Forwarding Address (278.68 MB)
5 Where is Layer 3 in our Packet (204.78 MB)
6 Packet Examples (283.14 MB)
1 Real-world Application (79.69 MB)
2 Knowing the Packet (330.37 MB)
3 Quirks in IP Addressing (238.85 MB)
4 Layer 3 Protocols (302.54 MB)
5 Encryption Issues (331.49 MB)
6 Capturing Those Packets (218.11 MB)
1 ICMP (53.25 MB)
2 Identifying ICMP (129.13 MB)
3 ICMP Communication (294.1 MB)
4 ICMP Addressing (206.34 MB)
5 Where is ICMP in our Packet (442.9 MB)
6 Packet Examples (318.25 MB)
1 UDP (33.03 MB)
2 Identifying UDP (189.87 MB)
3 UDP Communication (249.79 MB)
4 UDP Addressing (191.08 MB)
5 Where is UDP in our Packet (193.33 MB)
6 Packet Examples (278.59 MB)
1 TCP (30.73 MB)
2 Identifying TCP (222.43 MB)
3 TCP Communication (244.26 MB)
4 TCP Addressing (292.01 MB)
5 Where is TCP in our Packet (213.38 MB)
6 Packet Examples (258.94 MB)
[center]
Screenshot