Network Security Toolkit

Gain hands-on experience with essential network security tools. Learn how to analyze network traffic, scan for vulnerabilities, configure firewalls, and detect intrusions with this interactive toolkit.

Wireshark
Nmap Scanner
Firewall Config
IDS/IPS
Wireshark Packet Analyzer

Wireshark is a network protocol analyzer that lets you capture and interactively browse the traffic running on a computer network. Learn how to use it to inspect packets, diagnose issues, and detect security threats.

Examples: "host 192.168.1.1", "port 80", "tcp", "udp port 53"
Nmap Network Scanner

Nmap (Network Mapper) is a powerful security scanner used to discover hosts and services on a computer network. Learn how to detect open ports, identify running services, and discover potential vulnerabilities.

Examples: "192.168.1.1", "10.0.0-255.1-254", "scanme.nmap.org"
Examples: "--script=vuln", "-p 1-1000", "--exclude 192.168.1.5"
Firewall Configuration

Configure and manage firewall rules to control network traffic. Learn how to set up policies that allow or block specific types of connections based on source, destination, protocol, and other criteria.

Firewall Rules

Priority Action Protocol Source Destination Port Description Actions
1 ALLOW TCP ANY 192.168.1.15 80, 443 Allow web traffic to web server
2 ALLOW TCP 192.168.1.0/24 192.168.1.10 22, 445 Allow internal SSH and SMB
3 DENY TCP ANY 192.168.1.24 445 Block external SMB access
4 LOG TCP ANY 192.168.1.0/24 3389 Log RDP connection attempts
5 DENY ALL ANY ANY ANY Default deny rule
Intrusion Detection System

Monitor network traffic for suspicious activity and security policy violations with an Intrusion Detection System (IDS). Learn how to identify and respond to potential security

Monitor network traffic for suspicious activity and security policy violations with an Intrusion Detection System (IDS). Learn how to identify and respond to potential security threats in real-time.