All language subtitles for Free-CCNA-Wireshark-Demo-TCPUDP-Day-30-Lab-CCNA-200-301-Complete-Course_en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:02,830 --> 00:00:05,929 This is a free, complete course for the CCNA. 2 00:00:05,929 --> 00:00:09,779 If you like these videos, please subscribe\n 3 00:00:09,779 --> 00:00:13,759 Also, please like and leave a comment, and\n 4 00:00:16,778 --> 00:00:19,179 In this video we’ll take a look at Wireshark. 5 00:00:19,179 --> 00:00:23,448 I have shown you Wireshark a couple times\n 6 00:00:25,350 --> 00:00:28,640 Although there is a lot you can learn about\n 7 00:00:30,239 --> 00:00:34,259 Network engineers use it as a tool in their\n 8 00:00:36,189 --> 00:00:40,530 Using Packet Tracer’s ‘simulation’ mode\n 9 00:00:40,530 --> 00:00:43,439 not at the same level as Wireshark. 10 00:00:43,439 --> 00:00:47,599 Packet Tracer is a network simulator, but\n 11 00:00:49,600 --> 00:00:53,140 Up here you can see the packets as they are\n 12 00:00:53,140 --> 00:00:57,850 you are capturing traffic from, and if you\n 13 00:00:59,840 --> 00:01:04,000 Note that this kind of software is called\n 14 00:01:04,000 --> 00:01:10,000 Packet is just a general term we use, it doesn’t\n 15 00:01:10,000 --> 00:01:14,290 As you can see here, the entire frame is indeed\ncaptured. 16 00:01:14,290 --> 00:01:17,740 To download Wireshark, go to wireshark.org. 17 00:01:17,739 --> 00:01:21,079 It’s totally free, so you really should\nget it. 18 00:01:21,079 --> 00:01:25,769 At the end of this demonstration I’ll give\n 19 00:01:25,769 --> 00:01:29,759 so you’ll need to download it if you want\nto do them. 20 00:01:29,760 --> 00:01:33,910 Usually in my lab videos I give a shoutout\n 21 00:01:33,909 --> 00:01:37,759 simulator with a ton of guided practice labs. 22 00:01:37,760 --> 00:01:41,719 Since I’m not doing a regular configuration\n 23 00:01:41,719 --> 00:01:45,569 Boson’s CCNA courseware, which they released\nrecently. 24 00:01:45,569 --> 00:01:50,109 Basically, this is Boson’s complete course\nfor the CCNA. 25 00:01:50,109 --> 00:01:52,239 What do you get in the courseware? 26 00:01:52,239 --> 00:01:56,769 You get the curriculum, which is the main\n 27 00:01:56,769 --> 00:02:02,310 You get a PDF lab guide, and on top of that\n 28 00:02:02,310 --> 00:02:06,799 These are not the labs included in NetSim\n 29 00:02:09,008 --> 00:02:13,869 Here’s the table of contents for the curriculum,\n 30 00:02:14,870 --> 00:02:20,230 I always recommend using multiple resources\n 31 00:02:21,669 --> 00:02:27,429 I didn’t use their courseware for the previous\n 32 00:02:27,430 --> 00:02:31,170 courseware to study for my exams and it was\nexcellent. 33 00:02:31,169 --> 00:02:35,039 If you want to get Boson’s courseware, follow\n 34 00:02:35,039 --> 00:02:37,429 You can download a sample from their website. 35 00:02:40,889 --> 00:02:44,988 First up I’m just going to show you a brief\n 36 00:02:44,989 --> 00:02:49,680 being sent and received by the network interface\nof my PC. 37 00:02:49,680 --> 00:02:53,390 When the capture starts you’ll see there’s\n 38 00:02:55,330 --> 00:02:59,940 Then I open a YouTube page and start watching\n 39 00:02:59,939 --> 00:03:04,329 Okay, let’s just watch the video, it’s\n 40 00:03:04,330 --> 00:03:07,060 through an actual analysis of some of the\ntraffic. 41 00:03:55,280 --> 00:03:57,860 Okay, so that was a lot of traffic that went\npassing by. 42 00:04:00,400 --> 00:04:03,840 Notice that in Wireshark you are able to filter\noutput. 43 00:04:03,840 --> 00:04:06,360 There are many ways you can do so. 44 00:04:06,360 --> 00:04:11,599 This video isn’t about how to master Wireshark,\n 45 00:04:11,598 --> 00:04:15,280 Just notice that I filtered by the TCP port\nnumber. 46 00:04:15,280 --> 00:04:20,939 If you do want to learn more about Wireshark,\n 47 00:04:20,939 --> 00:04:25,329 and also a free Wireshark and ethical hacking\n 48 00:04:27,069 --> 00:04:32,300 Okay, notice the first message here, under\n 49 00:04:35,550 --> 00:04:40,270 Under ‘info’ you can see the source and\ndestination ports. 50 00:04:40,269 --> 00:04:48,219 From 62652 to 443 in the first message, and\n 51 00:04:53,459 --> 00:04:58,789 It’s the random source port my PC selected\n 52 00:05:00,750 --> 00:05:09,620 That’s HTTPS, Hypertext Transfer Protocol\n 53 00:05:09,620 --> 00:05:12,829 Look here, do you recognize this series of\nmessages? 54 00:05:19,829 --> 00:05:27,810 So, in these first three messages my PC and\n 55 00:05:27,810 --> 00:05:33,620 You can also see the sequence number, acknowledgment number, and 56 00:05:33,620 --> 00:05:37,439 Remember that I said the initial sequence\n 57 00:05:37,439 --> 00:05:41,629 You might be thinking it’s a big coincidence\n 58 00:05:43,290 --> 00:05:48,470 In Wireshark it is displayed as 0 here to\n 59 00:05:48,470 --> 00:05:51,160 but that’s not the actual sequence number. 60 00:05:51,160 --> 00:05:55,580 When we look further at the details of the\n 61 00:05:55,579 --> 00:06:01,099 So, sequence number 0 is acknowledged with\n 62 00:06:03,000 --> 00:06:05,350 Then my PC sends sequence number 1. 63 00:06:05,350 --> 00:06:09,860 Once again, these aren’t the real sequence\n 64 00:06:09,860 --> 00:06:15,050 this to make it easier to look at and analyze\nthe data exchange. 65 00:06:15,050 --> 00:06:18,520 Then there is the actual exchange of data\nhere. 66 00:06:18,519 --> 00:06:22,649 Notice that most of these display SSL in the\nprotocol column. 67 00:06:22,649 --> 00:06:29,289 SSL is what gives the security to HTTPS, Hypertext\n 68 00:06:29,290 --> 00:06:35,569 TCP is still being used, but Wireshark displays\n 69 00:06:35,569 --> 00:06:41,050 Finally, you can see the exchange of FINs\n 70 00:06:42,839 --> 00:06:46,000 You probably noticed that the flags are a\n 71 00:06:46,000 --> 00:06:51,329 lecture, there is an extra ACK in the first\nand third messages. 72 00:06:51,329 --> 00:06:55,359 There are some nuances to the connection termination\n 73 00:06:57,560 --> 00:07:04,780 I recommend just remembering the basic FIN,\n 74 00:07:04,779 --> 00:07:08,399 Now let’s briefly look inside one of those\nsegments. 75 00:07:08,399 --> 00:07:14,219 This is the very first SYN message at the\n 76 00:07:14,220 --> 00:07:19,530 First up, notice that the segment is of course\n 77 00:07:19,529 --> 00:07:25,109 We’re just looking deeper than we did before,\n 78 00:07:25,110 --> 00:07:29,550 Okay, I want to point out the sequence number\nhere. 79 00:07:29,550 --> 00:07:33,550 Notice that ‘0’ is the relative sequence\nnumber. 80 00:07:33,550 --> 00:07:37,180 Wireshark does this to make it easier to analyze\nthe traffic. 81 00:07:37,180 --> 00:07:40,379 Below you can see the real sequence number. 82 00:07:40,379 --> 00:07:45,038 As you can probably imagine, it is much harder\n 83 00:07:45,038 --> 00:07:50,009 numbers like 1 billion 224 million 315 thousand\n781. 84 00:07:50,009 --> 00:07:55,270 Okay, there are just a couple other things\n 85 00:07:55,269 --> 00:08:00,560 Because this is a SYN message, under the ‘flags’\n 86 00:08:01,970 --> 00:08:05,760 All of the other flags are not set, they are\n0. 87 00:08:05,759 --> 00:08:09,879 Finally, you can see the TCP window size down\nhere. 88 00:08:09,879 --> 00:08:16,990 Okay, before wrapping up this brief demonstration\n 89 00:08:16,990 --> 00:08:21,740 First up, notice that this is a DNS, Domain\n 90 00:08:21,740 --> 00:08:24,780 This is from my PC to a DNS server. 91 00:08:24,779 --> 00:08:28,299 So, what will the destination port be? 92 00:08:28,300 --> 00:08:33,599 As you can see here, my PC selected a random\n 93 00:08:33,599 --> 00:08:39,720 used 53 as the destination port, because that’s\n 94 00:08:39,720 --> 00:08:44,830 Within the segment you can indeed see that\n 95 00:08:44,830 --> 00:08:49,600 This is a DNS query message, you’ll learn\n 96 00:08:49,600 --> 00:08:54,620 That’s all I wanted to point out about UDP,\n 97 00:08:55,778 --> 00:09:01,600 Finally, here’s a little bit of homework\n 98 00:09:01,600 --> 00:09:05,290 You don’t have to do this, of course, but\n 99 00:09:05,289 --> 00:09:09,769 First, download Wireshark from wireshark.org. 100 00:09:09,769 --> 00:09:13,929 Then use it to capture network traffic sent\n 101 00:09:13,929 --> 00:09:17,159 Visit some websites while Wireshark is running. 102 00:09:17,159 --> 00:09:19,730 Then stop the Wireshark capture. 103 00:09:19,730 --> 00:09:24,600 Check out the packet captures, and find a\n 104 00:09:26,570 --> 00:09:30,660 Then find a TCP four-way handshake, a TCP\n 105 00:09:30,659 --> 00:09:34,990 Again, if you really want to learn how to\n 106 00:09:34,990 --> 00:09:39,639 Bombal’s free videos on YouTube or getting\n 107 00:09:39,639 --> 00:09:44,480 I’m no Wireshark expert myself, David Bombal\n 108 00:09:45,480 --> 00:09:49,289 Okay, that’s all for the video, I hope it\n 109 00:09:49,289 --> 00:09:55,289 captures and see some of the things we studied\n 110 00:09:55,289 --> 00:09:59,659 Before finishing today’s video I want to\n 111 00:09:59,659 --> 00:10:03,370 To join, please click the ‘Join’ button\nunder the video. 112 00:10:03,370 --> 00:10:10,450 Thank you to Benjamin, Deepak, Tshepiso, Justin,\n 113 00:10:10,450 --> 00:10:16,028 Erlison, Apogee, Wasseem, Marko, Florian,\n 114 00:10:16,028 --> 00:10:22,120 Value, John, Funnydart, Scott, Hassan, Gerrard,\n 115 00:10:22,120 --> 00:10:28,070 Mark, Yousif, Sidi, Boson Software, Charlesetta,\n 116 00:10:28,070 --> 00:10:32,820 Sorry if I pronounced your name incorrectly,\n 117 00:10:32,820 --> 00:10:37,209 One of you is still displaying as Channel\n 118 00:10:37,208 --> 00:10:40,359 me know and I’ll see if YouTube can fix\nit. 119 00:10:40,360 --> 00:10:44,730 This is the list of JCNP-level members at\n 120 00:10:44,730 --> 00:10:49,629 29th 2020, if you signed up recently and your\n 121 00:10:55,450 --> 00:10:59,360 Please subscribe to the channel, like the\n 122 00:10:59,360 --> 00:11:02,700 with anyone else studying for the CCNA. 123 00:11:02,700 --> 00:11:05,910 If you want to leave a tip, check the links\nin the description. 124 00:11:05,909 --> 00:11:11,328 I'm also a Brave verified publisher and accept\n 10258

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.