Pack IT Forwarding

Pack IT Forwarding

Paying it forward by sharing knowledge

Menu
  • Home
  • Certification
    • Cisco CyberOps Associate
    • CySA+
  • About
    • Guest Appearances

Month: August 2019

CCNA CyberOps SECOPS – Objective 2.6

No Comments
| Blog, CCNA CyberOps, Certification, cisco
Photo by Francis Seura from Pexels

Interpret common artifact elements from an event to identify an alert Implementing Cisco Cybersecurity Operations (210-255) IP Address (source/destination) IP address artifacts are useful to help identify both the attacker and the victim in a cybersecurity incident. IP address information can also help with tracking an attacker when they pivot through other systems. Client and […]

Read More »

CCNA CyberOps SECOPS – Objective 2.5

No Comments
| Blog, CCNA CyberOps, Certification, cisco

Extract files from a TCP stream when given a PCAP file and Wireshark Implementing Cisco Cybersecurity Operations (210-255) For this example, I made a sample pcapng file using Wireshark. I did a wget of a graphics file from my website. Go to File>Export Objects>HTTP (works the same with the other protocols listed) 2. Choose the […]

Read More »

CCNA CyberOps SECOPS – Objective 2.4

No Comments
| Blog, CCNA CyberOps, Certification, cisco

Identify these key elements in an intrusion from a given PCAP file : Source address, Destination address, Source port, Destination port, Protocols, and Payloads Implementing Cisco Cybersecurity Operations (210-255) PCAP files are a way of storing packet data captured using a packet sniffer like Wireshark. The Wireshark website has dozens of example packet captures that […]

Read More »

CCNA CyberOps SECOPS – Objective 2.3

No Comments
| Blog, CCNA CyberOps, Certification, cisco

Identify the elements from a NetFlow v5 record from a security event Implementing Cisco Cybersecurity Operations (210-255) When it comes to Netflow, the 5-tuple is king. Be sure to know the 5-tuple. Source IP Address Destination IP Address Source Port Destination Port Protocol 10.1.1.2 192.168.1.3 23343 443 TCP 10.1.3.3 192.168.3.2 43232 53 UDP 192.168.4.5 172.16.3.2 […]

Read More »

Posts pagination

Previous 1 … 5 6 7 8 Next

Follow Me

  • X
  • LinkedIn
  • Facebook
  • Email
  • RSS Feed
Ben Story @ntwrk80

Ben Story @ntwrk80

Ben Story is a network security engineer for a solution provider. He has been working with networking since 1998, his Freshman year at Truman State University, when he worked for a small dial-up ISP managing their Shiva LanRover modem bank. His random bits and bytes can be found on his blog at https://packitforwarding.com or on Twitter @ntwrk80.

Verified Services

View Full Profile →

Recent Posts

  • HPE Tech Jam 2025
  • Standards, Who Needs Standards!
  • Captive Portals and Not So Captive Portals
  • AI RRM It’s What’s On the Air
  • PCNSA 3.6

Archives

  • March 2025
  • June 2023
  • February 2023
  • March 2022
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • December 2020
  • November 2020
  • October 2020
  • August 2020
  • July 2020
  • June 2020
  • April 2020
  • March 2020
  • February 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • August 2011
Cisco IT Blog Awards Winner Most Inspirational
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© Ben Story 2025.

© Pack IT Forwarding 2025. Powered by WordPress

Go to mobile version