Let’s play a game. How long does it take you to learn something new in this video?
// YouTube VIDEOS mentioned //
Decrypting TLS HTTP/2 and QUIC with Wireshark:
Decrypting TLS, HTTP/2 and QUIC with …
// YouTube PLAYLIST //
Wireshark with Chris Greer:
>How TCP really works // Three-way han…
// David’s Social //
================
Connect with me:
================
Discord: http://discord.davidbombal.com
X: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube Main Channel https://www.youtube.com/davidbombal
YouTube Tech Channel: https://www.youtube.com/channel/UCZTIRrENWr_rjVoA7BcUE_A
YouTube Clips Channel: https://www.youtube.com/channel/UCbY5wGxQgIiAeMdNkW5wM6Q
YouTube Shorts Channel: https://www.youtube.com/channel/UCEyCubIF0e8MYi1jkgVepKg
Apple Podcast: https://davidbombal.wiki/applepodcast
Spotify Podcast: https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ
================
Support me:
================
Or, buy my CCNA course and support me:
DavidBombal.com: CCNA ($10): http://bit.ly/yt999ccna
Udemy CCNA Course: https://bit.ly/ccnafor10dollars
GNS3 CCNA Course: CCNA ($10): https://bit.ly/gns3ccna10
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// MENU //
00:00 – Introduction
00:28 – My Setup
00:43 – Do You Know?
01:26 – Start of Demonstration with Telnet
03:54 – Port Numbers Further Explained
04:55 – Using Apache2
06:29 – How Are Port Numbers Assigned?
08:39 – Ephemeral Ports
10:42 – Using Fing
11:34 – Restarting Apache2 and Denying TCP
15:54 – Which Port Numbers to Clients Actually Use?
17:46 – On Ubuntu
19:01 – Theory vs Reality
23:37 – Difference Between Port Number and Socket
26:07 – Demonstration Continued
29:04 – What You’ve Learned So Far
29:54 – One Last Demonstration
32:34 – Conclusion and Outro
// Detailed MENU //
00:00:00 – Introduction to the Game
– David introduces a game where viewers comment on the timestamp or topic where they learn something new.
00:00:11 – Importance of Port Numbers
– Emphasis on understanding port numbers for those interested in cybersecurity, networking, or other fields.
00:00:24 – Network Setup
– David describes the network setup involving Kali Linux, Cisco routers, a Windows computer, and mobile devices.
00:00:48- Understanding Ports and Sockets
– Queries about the difference between port numbers and sockets, and their relevance in TCP/IP.
00:01:28 – Demonstration with PuTTY and Telnet
– A practical demonstration using PuTTY and Telnet to connect to a specific port on a Cisco router.
00:03:04 – Character Generator Protocol (CHARGEN) Discussion
– Explaining CHARGEN Protocol and its historical significance.
00:03:11 – Disabling TCP Small Services and Testing Connection Refusal
– The process of disabling TCP small services on a router and testing the impact on connectivity.
00:04:01 – Kali Linux Server Setup and Apache Service Start
– Setting up a server on Kali Linux and starting the Apache service.
00:05:09 – Analyzing Network Traffic with Wireshark
– Using Wireshark to analyze traffic and understand port numbers in network communications.
00:06:39 – Understanding IANA Port Numbers and Ephemeral Ports
– A look at IANA’s list of port numbers and an explanation of ephemeral ports.
00:07:54 – FCs and Operating System Differences in Port Usage
– Discussing RFCs and how different operating systems use various port ranges.
00:08:54 – Testing Port Accessibility with Mobile Devices
– Using mobile devices to test the accessibility of ports on a network.
00:11:38 – Implementing Access Lists on Cisco Router
– Creating and modifying access lists on a Cisco router to control network traffic.
00:14:06 – Difference Between Port Numbers and Sockets
– Explaining the conceptual difference between port numbers and sockets.
00:16:00 – Demonstrating SSH Connections and Port Usage
– Demonstrating SSH connections from different devices and analyzing the port usage.
00:18:03 – Blocking SSH Traffic with Access Lists
– Blocking SSH traffic using access lists on a router and observing the effects.
00:21:37 – Discussion on DNS Protocol and Traffic Blocking
– Discussion on DNS protocols and the impact of blocking DNS traffic with access lists.
00:27:41 – Exploring HTTPS and QUIC Protocols with Browser Examples
– Exploring HTTPS and QUIC protocols using various web browsers and analyzing network traffic.
00:32:11 – Conclusion and Future Content Ideas
– Concluding remarks and thoughts on future networking-related content.
kali linux
linux
nmap
ssl
http
https
ssh
telnet
chargen
port
port numbers
wireshark
#kalilinux #cybersecurity #hacker