1 00:00:00,560 --> 00:00:03,860 So let's have a look at the network sniffing methods. 2 00:00:03,860 --> 00:00:10,130 First, we're going to learn how to listen to the network traffic and how to use some tools such as 3 00:00:10,160 --> 00:00:12,380 Tcpdump and Wireshark. 4 00:00:13,940 --> 00:00:15,800 During the penetration test. 5 00:00:15,830 --> 00:00:19,940 We listened to the network traffic for many good reasons. 6 00:00:19,970 --> 00:00:27,500 First of all, it's possible to obtain the clear text critical information such as usernames, passwords, 7 00:00:27,500 --> 00:00:29,600 instant messages, emails and all that. 8 00:00:30,590 --> 00:00:34,070 We can check to see if the scans were correctly. 9 00:00:34,620 --> 00:00:40,350 And some controls can be seen by listening to the network interface, such as if the scan parameters 10 00:00:40,350 --> 00:00:46,950 are set correctly, packets are properly exported from the network interface and responses are received. 11 00:00:47,850 --> 00:00:49,350 Listening to the traffic. 12 00:00:49,380 --> 00:00:54,820 Using passive scan methods, we can collect information about IP addresses. 13 00:00:54,840 --> 00:01:01,620 Services running on server systems and protocols and technologies used in network infrastructures. 14 00:01:01,620 --> 00:01:02,100 ET cetera. 15 00:01:02,100 --> 00:01:02,820 ET cetera.