The four phases of penetration testing include planning, discovery, attack and reporting. The planning phase is where you define the scope and make the rules of engagement. The scope is where the client tells you what networks to test and the goals and objective of the pen test. The next phase is called the discovery phase also sometimes called the information gathering phase. This is where you want to gather as much information as possible that are in scope with the rules of engagement. The attack phase is where you try to find the weakness you try to find a weakness in the networks. In the last phase, you report your finding. One …show more content…
To capture Data Packets follow these steps. First, lunch Wireshark you will see different type of connection types: Bluetooth Network Connection, Ethernet, VirtualBox Host-Only Network, and Wi-Fi. On the right of the live traffic select one or more of these networks with your mouse. Then, click on capture from the main menu, located towards the top of the Wireshark interface. When the drop-down menu appears, select the Start option. To capture packets you have to double-click on its name. After using Wireshark I have learned more about where my network traffic is going. This is a great tool to that will help me find out what is happening on my