10 Ways Companies Track You Online
11:21
Why Should You Learn Wireshark?
8:46
Пікірлер
@krishnasharma8195
@krishnasharma8195 4 күн бұрын
Learnt something new today, thank you ❤
@extrenzkey3841
@extrenzkey3841 7 күн бұрын
так а где TCP SYN Flood то
@xDelmore
@xDelmore 8 күн бұрын
Do you have to be on the same network to listen?
@plaintextpackets
@plaintextpackets 7 күн бұрын
You need to take a capture of the traffic, there are methods to do this like ARP poisoning which do require you to be on the same network
@xDelmore
@xDelmore 7 күн бұрын
@@plaintextpackets can you also make a video on how to capture otp messages with Wireshark?
@TradersTradingEdge
@TradersTradingEdge 11 күн бұрын
Hi. I hope you don't stop with the videos. Great information and learning material. Keep it going! 👍
@plaintextpackets
@plaintextpackets 11 күн бұрын
Thanks! Taking the summer off but will be back soon
@Zeroduckies
@Zeroduckies 11 күн бұрын
i used to transfer small lua games thru ping at school ^^
@keaco73
@keaco73 15 күн бұрын
Hi, I just installed your software in a Windows docker container. Few questions, is there a copy of the live source code within Docker or are the LIVE files within the same folder I unzipped the original download? So for instance, I downloaded the code to "Downloads" folder I have to enter my DNS IP in the env file within that folder or is a live copy within Docker that I should modify instead? Also, under the DNS category of the Dashboard I dont see the DNS IP I entered reflected anywhere. Lastly, is there a way to modify my DNS IP from the Dashboard too? thanks for your help!
@plaintextpackets
@plaintextpackets 15 күн бұрын
Hi there, yes you need to modify the file in the source code folder and docker will pick it up when launching. Docker will take that file and load it into the container. If you don’t see the DNS IP under “My DNS Server” ensure you set the ip prior to launching docker. Unfortunately no way of editing the vars from the gui Good luck!
@roadmonitoroz
@roadmonitoroz 17 күн бұрын
It would be interesting to know if that happens here and whether it would be needed. The shopping centre I visit (groceries) has a rewards card (pretty common). They even push it (cashier *if you can find one* asks you if you have a [insert rewards card name] card. They offer you discounts by the points you collect. i.e. Spend $10, get 10 points. 2000 points = $10 The thing is... By scanning that card (registered with your name and a unique identifier) , they now know who you are, every item you buy. I know this for a fact, because even when I shop online (usually done in person) , my previous purchased (whether online or in person) are in my history and get suggested to me (to make shopping easier *to make me spend more money*) The reason I initially signed up was that a petrol (gas) station gave rewards for fuel . I drove a company vehicle and would go through $40 - $70 / day. That meant I would (just by scanning it) , get free money (at least $10) / month for nothing. I've managed to score over $1000 in rewards (free cash for groceries / free fuel Everything is logged and watched these days. The checkout (self checkout) even has a build in camera to identify what type of thing you are weighing. It can tell if it is a tomato, granny smith apple / banana and brings up that option on the screen when you press "fruit and veg" button. Of course it weighs your bags (to stop shop lifting) and there are probably AI hooked to those cameras above you watching for suspicious activity.
@arcataslacker
@arcataslacker 19 күн бұрын
Rookie question but how do I reset my Grafana password? I've tried deleting the containers and volumes for netprobe but for some reason the Grafana password persists
@plaintextpackets
@plaintextpackets 18 күн бұрын
When you delete do “docker compose down -v” and that will delete all volumes as well, which store the persistent configs
@8rupees718
@8rupees718 24 күн бұрын
Thankyou Sir, you explain the concepts very well!
@zeeventuresph
@zeeventuresph 25 күн бұрын
is this possible to monitor 2 isp's at the same time?
@plaintextpackets
@plaintextpackets 24 күн бұрын
Not with the current version no. You’d need to install it on two different machines or VMs and hone each one to a different ISP
@Hackdaplanet-lp1ex
@Hackdaplanet-lp1ex Ай бұрын
Oh wow u just tap el chapo personal phone...damnnnn 😂
@juancampos352
@juancampos352 Ай бұрын
I love your videos, bro. You're helping me a lot of understanding this kind of concepts like VPN.
@plaintextpackets
@plaintextpackets Ай бұрын
Happy to hear that!
@kv4atv
@kv4atv Ай бұрын
I always turn Bluetooth OFF as soon as I get near the parking lot. Except for the cameras, your signal basically vanishes. Other than that would be to turn off your phone or leave it locked in the car turned off until you return. Electronic stalking should be Illegal. Stalking is stalking no matter how it's done.
@juanmondragon
@juanmondragon Ай бұрын
Keep up the great work. Your videos are assisting me in my IT career
@plaintextpackets
@plaintextpackets Ай бұрын
Great to hear!
@TonoNamnum
@TonoNamnum Ай бұрын
In the past that used to happen a lot. But today most modern phones will randomize that. Even your phone randomizes it's Mac address because of this. It's called Bluetooth address randomization.
@plaintextpackets
@plaintextpackets Ай бұрын
It has gotten better as many vendors have employed Bluetooth and wireless Mac randomization, but still not consistently employed. I’m also curious whether they are able to fingerprint devices using other identifiers within the beacon frames
@priyajagyasi3561
@priyajagyasi3561 Ай бұрын
hey, How to capture traffic for a particular URL. Lets say I am pinging any application's IP or running it on my browser. How to capture and get packet loss for that application?
@plaintextpackets
@plaintextpackets Ай бұрын
Get the IP of the URL first (in a terminal do “nslookup google.com” as an example) Then apply the capture filter “host x.x.x.x” where x.x.x.x is the IP you found for the website
@0xhamody
@0xhamody Ай бұрын
The question is, why do you use Windows still?!
@plaintextpackets
@plaintextpackets Ай бұрын
I use windows and Linux interchangeably. For recording videos Windows is much more user friendly
@majiddehbi9186
@majiddehbi9186 Ай бұрын
ok where id wshark role here and how can we see clearly what going on
@plaintextpackets
@plaintextpackets Ай бұрын
There are Bluetooth radios you can get for your laptop to sniff Bluetooth packets.
@khayla_matthews
@khayla_matthews Ай бұрын
This was so interesting! Thanks for posting
@plaintextpackets
@plaintextpackets Ай бұрын
You’re welcome!
@petergaudiomonte1080
@petergaudiomonte1080 Ай бұрын
Soo I know this might sound crazy and relatively on topic but I am developing a network of a handful of Pi's running Kismet and other beacon monitoring software to create a monitoring perimeter around my property. Of course, granted that would be trespassers are carrying devices trasnmitting beacons. Building upon an idea I saw from Kody on Nullbyte. Could also be used for stalkers..etc. another great video from you! Thank you for the work you put into your content!
@plaintextpackets
@plaintextpackets Ай бұрын
I’ve thought about the same for monitoring the devices that come in and out of my home perimeter (and whether I know them or not) - good luck on the project!
@LennyMiller739
@LennyMiller739 Ай бұрын
I thought the same thing based on 1 of those esp32 videos on nullbyte. Like square the property off with the boards and have them monitoring constantly, and then any mac that isn't whitelisted that has a stronger signal strength on the main unit inside then it does from the perimeter activates the sprinklers/turrets
@roadmonitoroz
@roadmonitoroz 17 күн бұрын
@@LennyMiller739 You could hook that to a laser perimeter ... i.e. lasers shoot to a LDR which the controller (pi / arduino . If the beam is broken, it sends a signal with laser number broken . You could even combine this with your project to find if it is a known / unknown device with the person.
@asipalacios8701
@asipalacios8701 Ай бұрын
bro i just fround my teamate ip on pubg , you are amazing i never thought about searching the RTPs
@nycrsny3406
@nycrsny3406 Ай бұрын
Great video, easy to understand with the simple animation. I don't quite understand how the Ad Network there knows who you are despite have connected through VPN, how did it do that?
@plaintextpackets
@plaintextpackets Ай бұрын
By looking at your cookies, which will be the same regardless of whether you’re using a VPN or not. So having an adblocker helps stop cookies and prevent this
@Mbro-dq2do
@Mbro-dq2do Ай бұрын
thank you so much
@plaintextpackets
@plaintextpackets Ай бұрын
You're welcome!
@Mbro-dq2do
@Mbro-dq2do Ай бұрын
Amazing video dude! I love the simple straightforward explanations.
@fancywaifu9821
@fancywaifu9821 Ай бұрын
My router supports wireshirk and I have a pi-hole recursive DNS on my local network. It’s been great
@qani613
@qani613 Ай бұрын
Running your own VPN server is much better and relatively easy to set up.
@plaintextpackets
@plaintextpackets Ай бұрын
Easy to setup but needs to be maintained and patched regularly, otherwise good
@nigelholland24
@nigelholland24 Ай бұрын
Thank you for doing this after I asked
@Dr_Larken
@Dr_Larken Ай бұрын
I’m curious, does anyone use air VPN? It allows you to purchase whatever plan anonymously “yes I’m aware of identifiers” with Monroe Crypto. But I honestly honestly haven’t met anyone or found anyone else else that uses it! I’m honestly curious! TY
@Dr_Larken
@Dr_Larken Ай бұрын
As someone who’s paranoid about their data it feels like a never-ending battle! I can’t believe people are so careless on what data is collected. It’s almost active privacy is fading! Sadly, the people that need to watch this won’t!
@plaintextpackets
@plaintextpackets Ай бұрын
100%
@dtime247
@dtime247 Ай бұрын
The U.S. Military Created the Internet. That should tell you a lot
@johnczech7074
@johnczech7074 2 ай бұрын
This was really fascinating and well presented. Thanks!
@plaintextpackets
@plaintextpackets 2 ай бұрын
Thank you!
@louisshade8624
@louisshade8624 2 ай бұрын
DUDE I LOVE YOU I LOVE YOUR CHANNEL PLZ KEEP UP THE FANTASTIC WORK u answer so many questions for me thanks a million
@plaintextpackets
@plaintextpackets 2 ай бұрын
No problem!
@JohnRobertPotter
@JohnRobertPotter 2 ай бұрын
Hey anyone can host a tor node, which means the NSA has a ton of tor node endpoints. Don't change the defaults and don't use a VPN unless you want DNS leakage
@louisshade8624
@louisshade8624 2 ай бұрын
question for you really i am asking to learn not to be a smart ass or anything but why is it bad to use a vpn ontop of tor just wondering
@JohnRobertPotter
@JohnRobertPotter 2 ай бұрын
@@louisshade8624 The tour network is more difficult to detect than a VPN, so let's say if China is trying to tell where your traffic is going through if they see well-known VPN endpoints which are usually not trying to hide... They will be able to influence the VPN situation a lot easier basically or at least tell that you're using one. Whoever controls the endpoints controls the information flow and can probably figure some things out you or i don't think they can. It's best to just leave the defaults and run tor from a virtual machine using a third party burner phone for the connection
@louisshade8624
@louisshade8624 2 ай бұрын
@@JohnRobertPotter thank u that actualy makes alot of sense
@ShriSumitJi
@ShriSumitJi 2 ай бұрын
from where u learn these
@plaintextpackets
@plaintextpackets 2 ай бұрын
Do you mean how did I learn all this?
@BunnyKhatri-pd8zm
@BunnyKhatri-pd8zm 2 ай бұрын
​@@plaintextpackets yes
@shaunrowley7230
@shaunrowley7230 2 ай бұрын
Another excellent video and think for true anonymity using TOR use Tails tails.net/
@plaintextpackets
@plaintextpackets 2 ай бұрын
Great suggestion, nice to have it on a USB in your kit
@mikemaldanado6015
@mikemaldanado6015 2 ай бұрын
Ed Snowden said the meta-data is enough to figure out what you're up to. They don't need to your actual data, just who you are connecting to , for how long, and how often.
@plaintextpackets
@plaintextpackets 2 ай бұрын
This
@fcgiova
@fcgiova 2 ай бұрын
Thank you very much for the content! Very clear and easy going. This comment is going to google to fill my profile (annoyed). One question about cookies, how it is harvested the way you're saying? I thought the cookie information could be read just for sites with same domain that the one who written it in first place. Maybe because they have scripts that execute other domain scripts inside? Like an embedded like button or something?
@plaintextpackets
@plaintextpackets 2 ай бұрын
Good question. Companies use shared ad networks which have common domains and can access cookies which were generated when accessing those sites.
@fcgiova
@fcgiova 2 ай бұрын
@@plaintextpackets here it goes my cookie, three cookies at least, watch, like and comment (I say this as a joke, not sure if this happens like that but it could). Thanks!
@repairstudio4940
@repairstudio4940 2 ай бұрын
You can actually be anonymous but it is not a walk in the park. Lots of remote proxies ... TOR proxies have end points but they're varied although they can and many times are monitored hence why setting up a network of remote physical proxies internationally is the way to go... But again its not a simple task and a lot of trust goes into those in your isolated anonymous network. Proxy chains work... Nuff said....
@plaintextpackets
@plaintextpackets 2 ай бұрын
Exactly. The average user can never really be expected to implement everything needed to be totally private
@mathieucaron4957
@mathieucaron4957 2 ай бұрын
How international criminal organizations are able to log into your Instagram/Facebook/etc. accounts even if you never click on their links?!?
@NahImPro
@NahImPro 2 ай бұрын
Weak password
@anonuser260
@anonuser260 2 ай бұрын
Trust me or not, they can see your web browser screen if they need to, i have seen it on my own eyes, idc what anyone says. Intercepting packets is nothing compared to this.
@mathieucaron4957
@mathieucaron4957 2 ай бұрын
They only "hack" criminals (or to spy) I guess... If they see your ip communicating with a terrorist, they would surely hack your pc/phone to get what they need. I don't know how they can do it, that would be interesting to learn 🤔
@Pipiopy
@Pipiopy 2 ай бұрын
how can I find the profile they have on me?
@Dexter101x
@Dexter101x 2 ай бұрын
You used cloudflare's ip address in this video, lol
@tyrojames9937
@tyrojames9937 2 ай бұрын
YES!👍🏾
@DamjanDimitrioski
@DamjanDimitrioski 2 ай бұрын
It knows I tried to connect with my router 1sec each hour, although my wan cable was disconnected and the router was powered off. Their diagnostic tools are poor :D.
@thienviet3429
@thienviet3429 2 ай бұрын
Can my isp see my full link? I mean my isp is able to see what I am doing from my link, don’t they? 9:08 If not, then I don’t have any questions.
@plaintextpackets
@plaintextpackets 2 ай бұрын
They can see the domain but not the full path
@garylove2836
@garylove2836 2 ай бұрын
You could always use elons musk starlink with a vpn concentrator and you don’t need isp.
@plaintextpackets
@plaintextpackets 2 ай бұрын
Starlink is an ISP
@garylove2836
@garylove2836 2 ай бұрын
@@plaintextpackets but the vpn concentrator will encrypt the traffic so the isp can’t see.
@plaintextpackets
@plaintextpackets 2 ай бұрын
@garylove2836 it’ll encrypt it between your home to the concentrator yes you’re right. From there the company who owns the concentrator or server it’s running on will be able to see
@garylove2836
@garylove2836 2 ай бұрын
@@plaintextpackets oh I see.
@gf.calabretta
@gf.calabretta 2 ай бұрын
Google: "machine, learn this" ✌🏽
@dadadies
@dadadies 2 ай бұрын
Are you censoring me or is youtube censoring me.
@skytechbits
@skytechbits 2 ай бұрын
ISP companies are regulated by the government so of course they can see everything everyone does.
@S_I_P_R_N_E_T
@S_I_P_R_N_E_T 2 ай бұрын
I am so glad I came across your channel. I am using NORDVPN via ASUS Router and OPENVPN but still....very informative. Keep up the good work.