Let's play a game. How long does it take you to learn something new in this video?

// YouTube VIDEOS mentioned //
Decrypting TLS HTTP/2 and QUIC with Wireshark: https://youtu.be/yodDbgoCnLM

// YouTube PLAYLIST //
Wireshark with Chris Greer: https://www.youtube.com/watch?v=rmFX1V49K8U&list=PLhfrWIlLOoKO8522T1OAhR5Bb2mD6Qy_l&pp=iAQB

// David SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/@davidbombal

// MY STUFF //
https://www.amazon.com/shop/davidbombal

// MENU //
00:00 - Introduction
00:28 - My Setup
00:43 - Do You Know?
01:26 - Start of Demonstration with Telnet
03:54 - Port Numbers Further Explained
04:55 - Using Apache2
06:29 - How Are Port Numbers Assigned?
08:39 - Ephemeral Ports
10:42 - Using Fing
11:34 - Restarting Apache2 and Denying TCP
15:54 - Which Port Numbers to Clients Actually Use?
17:46 - On Ubuntu
19:01 - Theory vs Reality
23:37 - Difference Between Port Number and Socket
26:07 - Demonstration Continued
29:04 - What You've Learned So Far
29:54 - One Last Demonstration
32:34 - Conclusion and Outro

// Detailed MENU //
00:00:00 - Introduction to the Game
- David introduces a game where viewers comment on the timestamp or topic where they learn something new.

00:00:11 - Importance of Port Numbers
- Emphasis on understanding port numbers for those interested in cybersecurity, networking, or other fields.

00:00:24 - Network Setup
- David describes the network setup involving Kali Linux, Cisco routers, a Windows computer, and mobile devices.

00:00:48- Understanding Ports and Sockets
- Queries about the difference between port numbers and sockets, and their relevance in TCP/IP.

00:01:28 - Demonstration with PuTTY and Telnet
- A practical demonstration using PuTTY and Telnet to connect to a specific port on a Cisco router.

00:03:04 - Character Generator Protocol (CHARGEN) Discussion
- Explaining CHARGEN Protocol and its historical significance.

00:03:11 - Disabling TCP Small Services and Testing Connection Refusal
- The process of disabling TCP small services on a router and testing the impact on connectivity.

00:04:01 - Kali Linux Server Setup and Apache Service Start
- Setting up a server on Kali Linux and starting the Apache service.

00:05:09 - Analyzing Network Traffic with Wireshark
- Using Wireshark to analyze traffic and understand port numbers in network communications.

00:06:39 - Understanding IANA Port Numbers and Ephemeral Ports
- A look at IANA's list of port numbers and an explanation of ephemeral ports.

00:07:54 - FCs and Operating System Differences in Port Usage
- Discussing RFCs and how different operating systems use various port ranges.

00:08:54 - Testing Port Accessibility with Mobile Devices
- Using mobile devices to test the accessibility of ports on a network.

00:11:38 - Implementing Access Lists on Cisco Router
- Creating and modifying access lists on a Cisco router to control network traffic.

00:14:06 - Difference Between Port Numbers and Sockets
- Explaining the conceptual difference between port numbers and sockets.

00:16:00 - Demonstrating SSH Connections and Port Usage
- Demonstrating SSH connections from different devices and analyzing the port usage.

00:18:03 - Blocking SSH Traffic with Access Lists
- Blocking SSH traffic using access lists on a router and observing the effects.

00:21:37 - Discussion on DNS Protocol and Traffic Blocking
- Discussion on DNS protocols and the impact of blocking DNS traffic with access lists.

00:27:41 - Exploring HTTPS and QUIC Protocols with Browser Examples
- Exploring HTTPS and QUIC protocols using various web browsers and analyzing network traffic.

00:32:11 - Conclusion and Future Content Ideas
- Concluding remarks and thoughts on future networking-related content.

kali linux
linux
nmap
ssl
http
https
ssh
telnet
chargen
port
port numbers
wireshark

#kalilinux #cybersecurity #hacker