Wireshark Session Replay & Packet Analysis | Hands-On Tutorial
Description: In this hands-on webinar, we dive into Wireshark session replay and packet analysis, covering the fundamentals and practical techniques for network forensics and troubleshooting. This tutorial includes live demonstrations of capturing, filtering, modifying, and replaying packets! 📌 Agenda: ✅ Fundamentals of Packets, Frames, and Network Traffic ✅ Filtering in Wireshark with Real Examples ✅ PCAP Replay using tcpreplay ✅ Editing & Replaying Packets with Scapy ✅ Basic Packet Analysis & Investigation Techniques 🎯 Who Should Watch? This webinar is perfect for network engineers, cybersecurity professionals, and enthusiasts interested in packet analysis, traffic replay, and network forensics using Wireshark, tcpreplay, and Scapy. 🔗 Commands used are in description below: 💡 Don’t forget to LIKE, SUBSCRIBE, and COMMENT if you found this useful! Let us know what Wireshark or network analysis topics you’d like us to cover next. 🚀🔥 #Wireshark #PacketAnalysis #NetworkForensics #PCAP #Cybersecurity #LiveDemo Commands from demo - ----------------- packet replay: ----------------- tcpreplay --intf1=eth0 telnet-raw.pcap ----------------- Edit packets and save new pcap: ----------------- from scapy.all import * # Load the pcap file packets = rdpcap('telnet-raw.pcap') # New source IP address new_src_ip = "192.168.1.99" # Modify source IP and delete checksums for recalculation for packet in packets: if IP in packet: packet[IP].src = new_src_ip del packet[IP].chksum if TCP in packet: del packet[TCP].chksum elif UDP in packet: del packet[UDP].chksum # Save the modified packets wrpcap('modified-ip.pcap', packets)
Download
0 formatsNo download links available.