just pushed subscribe before 30 secs this is my first videos ❤❤❤
@CorpusCrispy11 сағат бұрын
Thank you for the content, and for letting kitty participate!
@EPurnachandrapatro2 күн бұрын
liked it
@venkateshvr12462 күн бұрын
Thank you Chris for sharing your knowledge.
@tahersadeghi67733 күн бұрын
Long introduction.
@ahmetemre13593 күн бұрын
Excellent video by the Chris!!!
@masudimtiaz23254 күн бұрын
These are excellent contents, Chris. I'd like to know more about TCP Optimization.
@Its_me_Abdul4 күн бұрын
Hi Chris, thanks foe the nice and informative video, watched it couple of times and using it as a reference. I have a question which I couldn't find any answer for that. What does "windows scaling factor -1 [unknown] means and is it a problem ? Thanks in advance.
@rb22876 күн бұрын
It’s one thing to simple push buttons and watch “stuff” happen, but in the legal world (criminal and civil), you may very well be called to testify to the veracity of the “evidence” you discovered. If you lack experience and don’t understand what is going on “under the hood”, prepare to be made to look like a bumbling fool. Your evidence will be easily suppressed. So, yeah you need to know more than pushing buttons and typing commands and stating “well that’s what I was taught to do, but I don’t know what any of it really means or how it works.”
@rb22876 күн бұрын
AND, the better you know how to hack, the better you will be at troubleshooting a hacked network! In my humble opinion, you will not be a good network security person if you don’t know how to hack.
@marco84mty8 күн бұрын
what is the relation between window size and mss? i.e. if we have a window size of 65535 and a capacity of 1460mss, does it mean we can receive almost 45 tcp segments with 1460 bytes in payload each in a row?
@masudimtiaz23258 күн бұрын
Excellent! Thanks,
@tonyruiz20468 күн бұрын
⭐️👍⭐️
@ozan6289 күн бұрын
At 6:37, why do we compare UDP to IP, instead of asking "why is quic built on top of UDP instead of TCP". I am confused because IP is a network layer protocol, so obviously it makes more sense to build quic on top of UDP. What do i miss here?
@wntrpbk9 күн бұрын
18:16 Instead of Following TCP Stream. Follow HTTP Stream and you will get a hit on artist=1. Excellent well-paced, great explanations and tips in this video. As someone new to Wireshark I have learned a lot and looking forward to learning much more from you.
@ibejoe771910 күн бұрын
Good stuff! definitely make more and if possible in your own website and charge a small fees for a certificate of completion 😅
@baluhyajr.91314 күн бұрын
.
@jodypetroni313514 күн бұрын
this was one of the best explanation videos ever! thanks Chris
@baluhyajr.91315 күн бұрын
.
@tonyruiz204617 күн бұрын
⭐️👍⭐️
@abc-by1kb19 күн бұрын
Man your way of explaining things is just absolutely amazing! Great video!
@abdallahhussein599719 күн бұрын
How to decrypt data from HTTPS make a video on this one please
@musafir_119419 күн бұрын
Thank you, brother!!
@mbbm-oo4do20 күн бұрын
13:26 how did you know there are repated
@ramber102121 күн бұрын
Great video Chris, thank you :)
@oohmisslady21 күн бұрын
I know this class series is a bit older now, but i wanted to drop a massive thank you just the same. Im stepping up my network game at work which also gappens to be a new company for me too. Ive been able to follow along and also realized how much i already knew, but was able to get fully comfy. On my way to becoming an SME in no time!! Thank you my good sir x a thousand!
@nehalkapse176121 күн бұрын
Great video
@remixesanddownpitches614122 күн бұрын
you explain this so well. i am so grateful for you and this channel
@joshsawyer988022 күн бұрын
when trying to setup a ring buffer and save the files into a folder it says "Ring buffer requested, but capture isn't being saved to a permanent file."
@hilalsaeed793223 күн бұрын
Chris, why client didn't acknowledge packet no. 6 from the server? It only acknowledge packet no. 7?
@baskarnataraj204223 күн бұрын
Thanks, FYI to understand the DHCP flow. I'm new to this technology, If we use the password-enabled AP sometimes the DHCP/PING(ICMP) packets are not showing in the wireshark. I have enabled the decryption keys, but the packets are still not decrypted properly. I have added the key to the 802.11 protocol decryption column "password:ssid". How to get the all the time dhcp, icmp(ping) frames in the wireshark? I have tried two ways 1) I have used the airpcap in windows 2) i have used linux laptop in that i have configured the interface as monitor mode with the default wifi card. Both the ways are not helpful. please correct if i did anything wrong.
@Om3gaLinx24 күн бұрын
I’ve been trying to understand activity done on websites such as something like, what did someone look up on google? Is it possible to see what they searched or is the decryption not that strong?
@rdh947524 күн бұрын
Get to the point .
@augustinfernandes708025 күн бұрын
Hey chris, I just wanted to know can is possible to capture COM data on wireshark in unix system.????
@vikaspotadar26 күн бұрын
Chris deserves more subscribers. Contents are great and explained well.
@danr474626 күн бұрын
You lost me early.
@mindiswealth26 күн бұрын
THANK YOU FOR MAKING THIS VIDEO. I have started my journey in CS and a job I applied to has asked me to extract a pdf file from the PCAP and this helped me so much! THANK YOU
@finance1010225 күн бұрын
OMG ME TOOO!!!
@finance1010225 күн бұрын
Was it Nukuo?
@mindiswealth25 күн бұрын
@@finance10102 YOOO YES 😂 small world man!
@IxapanI24 күн бұрын
@@finance10102 yes same
@mehershewon930123 күн бұрын
Did you follow this step by step and it worked?
@anuragdixit87Ай бұрын
Hi Chris you are great and having each classes and seminar wonderful...but I am little bit confused about window size vs acknowledge number as you say acknowledge sent once bytes of packet transferred to other end ...now how can we track particular data from specific window which is lost during communication....pls correct my understanding if I am wrong let's suppose we have window 65535 at both side and mss value is 1460 ...so data can be transferred 1460 bytes in once and assign 1 sequence number which require acknowledge number based on previous sequence number +1
@anuragdixit87Ай бұрын
Or you can tell how window size , sequence number and acknowledge number work together....I am very much clear about specific these terminology but confused about you said as acknowledge can given only when whole window data transfer
@jeanm2771Ай бұрын
I'm relatively new to tcp analysis and I have a strange example where the window size green graph seems totally uncorrelated to the other bytes in flight (blue) / acknowledge (brown) graphs which is unlike in your example. Also in the trace I have the bytes in flight are always displayed along the brown graph. What is the explanation to what I'm seeing?
@yti9095Ай бұрын
Am I the only one who thinks this tutorial is hard as a beginner🙂
@teddybean9948Ай бұрын
10 out of 10 rating from me. Best explanation ever.
@user-ov2rt7di9eАй бұрын
not working but useful information
@alisclips8275Ай бұрын
Sir I want hack some websites kindly help me
@MGKing-888Ай бұрын
The IPs on the endpoints are the ones that someone is hacking me from?
@igloo8235Ай бұрын
why does the guy on the right have shrek's balls for eyes
@rmstech9933Ай бұрын
You are just awsome.
@successjames-pu7dsАй бұрын
give us a new link for the log file thanks sir
@successjames-pu7dsАй бұрын
The link not working to download the file
@gasovensforqcultАй бұрын
It is completely frustrating when you follow the directions and sextuple check the file path, but the keylog.log file just isn't in the file and you've restarted Chrome. This is compounded by seeing others with the same problem on Microsoft Community and Stack Overflow, and you follow all the different trouble shooting scenarios but still the file isn't where it is supposed to be. I don't have hours and hours to try and find a file that is listed in the environmental variables window where it was created and the path is correct, but when you go to File Explorer to see the results and check the file AND IT ISN'T THERE
@ChrisGreerАй бұрын
There are so many variables to make this thing work - version, updates, patches… I would suggest giving it a shot in Linux. I have had more consistent success doing it on my Kali VM than in Windows. I show how to do this in my Decrypting QUIC video. Give that a look and I hope it works for you!