1 00:00:00,790 --> 00:00:07,450 So let's have a look at the network sniffing methods first, we're going to learn how to listen to the 2 00:00:07,450 --> 00:00:12,280 network traffic and how to use some tools such as TCP Dump and Wireshark. 3 00:00:14,110 --> 00:00:20,800 During the penetration test, we listen to the network traffic for many good reasons, first of all, 4 00:00:21,430 --> 00:00:28,120 it's possible to obtain the clear text, critical information such as usernames, passwords, instant 5 00:00:28,120 --> 00:00:29,650 messages, emails and all that. 6 00:00:30,850 --> 00:00:33,880 We can check to see if the scans were correctly. 7 00:00:34,780 --> 00:00:40,450 And some controls can be seen by listening to the network interface, such as if the scan parameters 8 00:00:40,450 --> 00:00:46,840 are set correctly, packets are properly exported from the network interface and responses are received. 9 00:00:48,040 --> 00:00:54,640 Listening to the traffic, using passive scan methods, we can collect information about IP addresses, 10 00:00:55,150 --> 00:01:01,660 services running on server systems and protocols and technologies used in network infrastructures, 11 00:01:01,660 --> 00:01:02,680 et cetera, et cetera.