Relevant System Proficiency Wireshark Searching For Certain Protocols Ethical Hacking John The Ripper Password Cracking Passive Reconnaissance