You need to take a capture of the traffic, there are methods to do this like ARP poisoning which do require you to be on the same network
@xDelmore7 күн бұрын
@@plaintextpackets can you also make a video on how to capture otp messages with Wireshark?
@TradersTradingEdge11 күн бұрын
Hi. I hope you don't stop with the videos. Great information and learning material. Keep it going! 👍
@plaintextpackets11 күн бұрын
Thanks! Taking the summer off but will be back soon
@Zeroduckies11 күн бұрын
i used to transfer small lua games thru ping at school ^^
@keaco7315 күн бұрын
Hi, I just installed your software in a Windows docker container. Few questions, is there a copy of the live source code within Docker or are the LIVE files within the same folder I unzipped the original download? So for instance, I downloaded the code to "Downloads" folder I have to enter my DNS IP in the env file within that folder or is a live copy within Docker that I should modify instead? Also, under the DNS category of the Dashboard I dont see the DNS IP I entered reflected anywhere. Lastly, is there a way to modify my DNS IP from the Dashboard too? thanks for your help!
@plaintextpackets15 күн бұрын
Hi there, yes you need to modify the file in the source code folder and docker will pick it up when launching. Docker will take that file and load it into the container. If you don’t see the DNS IP under “My DNS Server” ensure you set the ip prior to launching docker. Unfortunately no way of editing the vars from the gui Good luck!
@roadmonitoroz17 күн бұрын
It would be interesting to know if that happens here and whether it would be needed. The shopping centre I visit (groceries) has a rewards card (pretty common). They even push it (cashier *if you can find one* asks you if you have a [insert rewards card name] card. They offer you discounts by the points you collect. i.e. Spend $10, get 10 points. 2000 points = $10 The thing is... By scanning that card (registered with your name and a unique identifier) , they now know who you are, every item you buy. I know this for a fact, because even when I shop online (usually done in person) , my previous purchased (whether online or in person) are in my history and get suggested to me (to make shopping easier *to make me spend more money*) The reason I initially signed up was that a petrol (gas) station gave rewards for fuel . I drove a company vehicle and would go through $40 - $70 / day. That meant I would (just by scanning it) , get free money (at least $10) / month for nothing. I've managed to score over $1000 in rewards (free cash for groceries / free fuel Everything is logged and watched these days. The checkout (self checkout) even has a build in camera to identify what type of thing you are weighing. It can tell if it is a tomato, granny smith apple / banana and brings up that option on the screen when you press "fruit and veg" button. Of course it weighs your bags (to stop shop lifting) and there are probably AI hooked to those cameras above you watching for suspicious activity.
@arcataslacker19 күн бұрын
Rookie question but how do I reset my Grafana password? I've tried deleting the containers and volumes for netprobe but for some reason the Grafana password persists
@plaintextpackets18 күн бұрын
When you delete do “docker compose down -v” and that will delete all volumes as well, which store the persistent configs
@8rupees71824 күн бұрын
Thankyou Sir, you explain the concepts very well!
@zeeventuresph25 күн бұрын
is this possible to monitor 2 isp's at the same time?
@plaintextpackets24 күн бұрын
Not with the current version no. You’d need to install it on two different machines or VMs and hone each one to a different ISP
@Hackdaplanet-lp1exАй бұрын
Oh wow u just tap el chapo personal phone...damnnnn 😂
@juancampos352Ай бұрын
I love your videos, bro. You're helping me a lot of understanding this kind of concepts like VPN.
@plaintextpacketsАй бұрын
Happy to hear that!
@kv4atvАй бұрын
I always turn Bluetooth OFF as soon as I get near the parking lot. Except for the cameras, your signal basically vanishes. Other than that would be to turn off your phone or leave it locked in the car turned off until you return. Electronic stalking should be Illegal. Stalking is stalking no matter how it's done.
@juanmondragonАй бұрын
Keep up the great work. Your videos are assisting me in my IT career
@plaintextpacketsАй бұрын
Great to hear!
@TonoNamnumАй бұрын
In the past that used to happen a lot. But today most modern phones will randomize that. Even your phone randomizes it's Mac address because of this. It's called Bluetooth address randomization.
@plaintextpacketsАй бұрын
It has gotten better as many vendors have employed Bluetooth and wireless Mac randomization, but still not consistently employed. I’m also curious whether they are able to fingerprint devices using other identifiers within the beacon frames
@priyajagyasi3561Ай бұрын
hey, How to capture traffic for a particular URL. Lets say I am pinging any application's IP or running it on my browser. How to capture and get packet loss for that application?
@plaintextpacketsАй бұрын
Get the IP of the URL first (in a terminal do “nslookup google.com” as an example) Then apply the capture filter “host x.x.x.x” where x.x.x.x is the IP you found for the website
@0xhamodyАй бұрын
The question is, why do you use Windows still?!
@plaintextpacketsАй бұрын
I use windows and Linux interchangeably. For recording videos Windows is much more user friendly
@majiddehbi9186Ай бұрын
ok where id wshark role here and how can we see clearly what going on
@plaintextpacketsАй бұрын
There are Bluetooth radios you can get for your laptop to sniff Bluetooth packets.
@khayla_matthewsАй бұрын
This was so interesting! Thanks for posting
@plaintextpacketsАй бұрын
You’re welcome!
@petergaudiomonte1080Ай бұрын
Soo I know this might sound crazy and relatively on topic but I am developing a network of a handful of Pi's running Kismet and other beacon monitoring software to create a monitoring perimeter around my property. Of course, granted that would be trespassers are carrying devices trasnmitting beacons. Building upon an idea I saw from Kody on Nullbyte. Could also be used for stalkers..etc. another great video from you! Thank you for the work you put into your content!
@plaintextpacketsАй бұрын
I’ve thought about the same for monitoring the devices that come in and out of my home perimeter (and whether I know them or not) - good luck on the project!
@LennyMiller739Ай бұрын
I thought the same thing based on 1 of those esp32 videos on nullbyte. Like square the property off with the boards and have them monitoring constantly, and then any mac that isn't whitelisted that has a stronger signal strength on the main unit inside then it does from the perimeter activates the sprinklers/turrets
@roadmonitoroz17 күн бұрын
@@LennyMiller739 You could hook that to a laser perimeter ... i.e. lasers shoot to a LDR which the controller (pi / arduino . If the beam is broken, it sends a signal with laser number broken . You could even combine this with your project to find if it is a known / unknown device with the person.
@asipalacios8701Ай бұрын
bro i just fround my teamate ip on pubg , you are amazing i never thought about searching the RTPs
@nycrsny3406Ай бұрын
Great video, easy to understand with the simple animation. I don't quite understand how the Ad Network there knows who you are despite have connected through VPN, how did it do that?
@plaintextpacketsАй бұрын
By looking at your cookies, which will be the same regardless of whether you’re using a VPN or not. So having an adblocker helps stop cookies and prevent this
@Mbro-dq2doАй бұрын
thank you so much
@plaintextpacketsАй бұрын
You're welcome!
@Mbro-dq2doАй бұрын
Amazing video dude! I love the simple straightforward explanations.
@fancywaifu9821Ай бұрын
My router supports wireshirk and I have a pi-hole recursive DNS on my local network. It’s been great
@qani613Ай бұрын
Running your own VPN server is much better and relatively easy to set up.
@plaintextpacketsАй бұрын
Easy to setup but needs to be maintained and patched regularly, otherwise good
@nigelholland24Ай бұрын
Thank you for doing this after I asked
@Dr_LarkenАй бұрын
I’m curious, does anyone use air VPN? It allows you to purchase whatever plan anonymously “yes I’m aware of identifiers” with Monroe Crypto. But I honestly honestly haven’t met anyone or found anyone else else that uses it! I’m honestly curious! TY
@Dr_LarkenАй бұрын
As someone who’s paranoid about their data it feels like a never-ending battle! I can’t believe people are so careless on what data is collected. It’s almost active privacy is fading! Sadly, the people that need to watch this won’t!
@plaintextpacketsАй бұрын
100%
@dtime247Ай бұрын
The U.S. Military Created the Internet. That should tell you a lot
@johnczech70742 ай бұрын
This was really fascinating and well presented. Thanks!
@plaintextpackets2 ай бұрын
Thank you!
@louisshade86242 ай бұрын
DUDE I LOVE YOU I LOVE YOUR CHANNEL PLZ KEEP UP THE FANTASTIC WORK u answer so many questions for me thanks a million
@plaintextpackets2 ай бұрын
No problem!
@JohnRobertPotter2 ай бұрын
Hey anyone can host a tor node, which means the NSA has a ton of tor node endpoints. Don't change the defaults and don't use a VPN unless you want DNS leakage
@louisshade86242 ай бұрын
question for you really i am asking to learn not to be a smart ass or anything but why is it bad to use a vpn ontop of tor just wondering
@JohnRobertPotter2 ай бұрын
@@louisshade8624 The tour network is more difficult to detect than a VPN, so let's say if China is trying to tell where your traffic is going through if they see well-known VPN endpoints which are usually not trying to hide... They will be able to influence the VPN situation a lot easier basically or at least tell that you're using one. Whoever controls the endpoints controls the information flow and can probably figure some things out you or i don't think they can. It's best to just leave the defaults and run tor from a virtual machine using a third party burner phone for the connection
@louisshade86242 ай бұрын
@@JohnRobertPotter thank u that actualy makes alot of sense
@ShriSumitJi2 ай бұрын
from where u learn these
@plaintextpackets2 ай бұрын
Do you mean how did I learn all this?
@BunnyKhatri-pd8zm2 ай бұрын
@@plaintextpackets yes
@shaunrowley72302 ай бұрын
Another excellent video and think for true anonymity using TOR use Tails tails.net/
@plaintextpackets2 ай бұрын
Great suggestion, nice to have it on a USB in your kit
@mikemaldanado60152 ай бұрын
Ed Snowden said the meta-data is enough to figure out what you're up to. They don't need to your actual data, just who you are connecting to , for how long, and how often.
@plaintextpackets2 ай бұрын
This
@fcgiova2 ай бұрын
Thank you very much for the content! Very clear and easy going. This comment is going to google to fill my profile (annoyed). One question about cookies, how it is harvested the way you're saying? I thought the cookie information could be read just for sites with same domain that the one who written it in first place. Maybe because they have scripts that execute other domain scripts inside? Like an embedded like button or something?
@plaintextpackets2 ай бұрын
Good question. Companies use shared ad networks which have common domains and can access cookies which were generated when accessing those sites.
@fcgiova2 ай бұрын
@@plaintextpackets here it goes my cookie, three cookies at least, watch, like and comment (I say this as a joke, not sure if this happens like that but it could). Thanks!
@repairstudio49402 ай бұрын
You can actually be anonymous but it is not a walk in the park. Lots of remote proxies ... TOR proxies have end points but they're varied although they can and many times are monitored hence why setting up a network of remote physical proxies internationally is the way to go... But again its not a simple task and a lot of trust goes into those in your isolated anonymous network. Proxy chains work... Nuff said....
@plaintextpackets2 ай бұрын
Exactly. The average user can never really be expected to implement everything needed to be totally private
@mathieucaron49572 ай бұрын
How international criminal organizations are able to log into your Instagram/Facebook/etc. accounts even if you never click on their links?!?
@NahImPro2 ай бұрын
Weak password
@anonuser2602 ай бұрын
Trust me or not, they can see your web browser screen if they need to, i have seen it on my own eyes, idc what anyone says. Intercepting packets is nothing compared to this.
@mathieucaron49572 ай бұрын
They only "hack" criminals (or to spy) I guess... If they see your ip communicating with a terrorist, they would surely hack your pc/phone to get what they need. I don't know how they can do it, that would be interesting to learn 🤔
@Pipiopy2 ай бұрын
how can I find the profile they have on me?
@Dexter101x2 ай бұрын
You used cloudflare's ip address in this video, lol
@tyrojames99372 ай бұрын
YES!👍🏾
@DamjanDimitrioski2 ай бұрын
It knows I tried to connect with my router 1sec each hour, although my wan cable was disconnected and the router was powered off. Their diagnostic tools are poor :D.
@thienviet34292 ай бұрын
Can my isp see my full link? I mean my isp is able to see what I am doing from my link, don’t they? 9:08 If not, then I don’t have any questions.
@plaintextpackets2 ай бұрын
They can see the domain but not the full path
@garylove28362 ай бұрын
You could always use elons musk starlink with a vpn concentrator and you don’t need isp.
@plaintextpackets2 ай бұрын
Starlink is an ISP
@garylove28362 ай бұрын
@@plaintextpackets but the vpn concentrator will encrypt the traffic so the isp can’t see.
@plaintextpackets2 ай бұрын
@garylove2836 it’ll encrypt it between your home to the concentrator yes you’re right. From there the company who owns the concentrator or server it’s running on will be able to see
@garylove28362 ай бұрын
@@plaintextpackets oh I see.
@gf.calabretta2 ай бұрын
Google: "machine, learn this" ✌🏽
@dadadies2 ай бұрын
Are you censoring me or is youtube censoring me.
@skytechbits2 ай бұрын
ISP companies are regulated by the government so of course they can see everything everyone does.
@S_I_P_R_N_E_T2 ай бұрын
I am so glad I came across your channel. I am using NORDVPN via ASUS Router and OPENVPN but still....very informative. Keep up the good work.