Big thank you to Proton for sponsoring this video. Get Proton VPN using my link: davidbombal.wiki/protonvpn2 // Chris’ SOCIAL // LinkedIn: www.linkedin.com/in/cgreer/ KZbin: kzbin.info X/Twitter: twitter.com/packetpioneer // GitHub Link to lab file // Packet Pioneer GitHub: github.com/packetpioneer/youtube/blob/main/Lab1-GreerBombal_ItsNotTheNetwork.pcapng // KZbin videos REFERENCE // Wireshark Tutorial for beginners. Where to start with Wireshark: kzbin.info/www/bejne/hYaQcmV7orulgbM // KZbin PLAYLIST // Wireshark with Chris Greer: kzbin.info/www/bejne/qJ6piWSMaZ5-brc&pp=iAQB // David SOCIAL // Discord: discord.com/invite/usKSyzb X: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal KZbin: www.youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
@harrylumsdon67738 ай бұрын
Old days. Fluke optiview, and iperf.
@aliabbas488 ай бұрын
29:10 I spent a lot of time earlier to understand that why I am getting huge value in segment length column although MTU is set 1500. Thank you Chris for going to different tangents; it helps a lot! Thank you David for bringing such valueable persons on your channel!
@ChrisGreer8 ай бұрын
Yeah that is a tricky one!
@Mike.Kachar8 ай бұрын
I ❤ the videos you do with Chris Greer. The info he provides about Wireshark & what you're looking at + for within pcap's is something, I feel, today every network'er should know how to do & what to look for. 👍👍👌
@zchantzis8 ай бұрын
David & Chris you are opening our eyes 👀. Thank you 🙏
@davidbombal8 ай бұрын
Happy to hear that! You're welcome!
@jjdope928 ай бұрын
A very big thank you to both of you. You guys are literally changing the way I look into network issues and I am becoming better and better each day. Keep up the beyond-excellent work.
@BrokenKanuck7 ай бұрын
Wasn't expecting to watch this end to end, - but damn, enthralled. Love this stuff!
@ken_tx8 ай бұрын
Chris is a great mentor. His knowledge, personality and demeanor lend himself to being great. Always enjoy his content, thanks for hosting him.
@ChrisGreer8 ай бұрын
Thanks for the comment! I really enjoy coming on and chatting with david.
@Lovely_planet8 ай бұрын
Couldn’t have said it better
@dingokidneys8 ай бұрын
These are always fascinating and as for the digressions, I'm OK with them because you always come back to the point you digressed from but have also imparted some breadth to the discussion. I could always jump ahead in any case if I found them unhelpful.
@wadebrumbaugh75798 ай бұрын
I ❤ the detailed tangents. In this case (29 min mark), it helped me understand where in the process the capture actually happens and why they show larger than 1500. Keep the details coming.
@TomWhi7 ай бұрын
Ironically talking about the slow passage of time between packets, but at the same time this video was over before I knew it! Fantastic explanation as always, and lovely to see you again as a guest, Chris.
@jaxytvidsАй бұрын
When you think about it, there is great significance to the passage of time. And there is such great significance to the passage of time when we think about a day in the life of our packets.
@chrismoore19818 ай бұрын
Thanks Chris/David. Chris I love more detail than less detail when explaining different things.
@apeironMEG8 ай бұрын
Hey Chris don't listen anybody and give us that details please. Those kind of knowledges are necessary when you try to give a logic to processes. Thank you David, awesome again. Appreciate it.
@kovi178 ай бұрын
No lies, the detailed tangents really help expand on the why of it for me. Great video guys!
@ChrisGreer8 ай бұрын
Thanks for the feedback. I love getting to the point, but so much is lost when you do that.
@kovi178 ай бұрын
@@ChrisGreer Absolutely! I’ve just started transitioning to an IT based career and earned the A+ certification and working on security+. Every time you expanded upon the point you were making it definitely helped me understand things better. Thanks for your content, and I absolutely subscribed to your channel!
@marvelousekpenyong43438 ай бұрын
great work David and Chris. I love your contents. I'm someone looking for breakthrough in Wireshark packet analysis. I feel Chris' channel is just the right place for me. Love from Nigeria. Keep up the good work. Thank you so much David. Looking forward to more sessions like this with you and chris
@Tech-wise-8 ай бұрын
Thanks Chris Greer and David Bombal. Getting in detail is actually good as it further clears the concept of what is behind the stuff you're imparting.
@karanb20678 ай бұрын
I once used the skills Chris taught to analyze an LNK file attack, showed me how beautiful that attack was...
@KeithPawson8 ай бұрын
This is brilliant, I have another bookmarked video! Digressing is fine and works for me, Chris adds value to the subject when he does this. Even in 2024 the basic fundamentals of TCP are essential, just wish I had more time to spend in this area.
@jgl15638 ай бұрын
I watch lots of your videos David but damn!!... this has been one of my favorites by far. Please we need more content like this 🙏🏼🙏🏼🙏🏼
@BlaMM748 ай бұрын
This is very timely, I'm dealing with network issues right now!
@raymation3d8 ай бұрын
Chris I love your side bars and detailed tangents little buddy absolute gold!
@Maxშემიწყალე8 ай бұрын
I bought this dudes Wireshark course on Udemy; very solid. Would recommend for anyone in IT to take it. Thank you David for having this dude on.
@johnblixt47408 ай бұрын
Love the details and tangents because it helps me understand more of the big picture. Awesome content and I'm going to get lost in your channel, Chris. Thanks both!
@vincentio10606 ай бұрын
This channel is a goldmine for aspiring networking/cyber security professionals
@EWCRC8 ай бұрын
Always enjoy a good detailed tangent.
@whosonedphone8 ай бұрын
Love the detailed tangents. Would like to know what the window size is.
@breakingbisley6 ай бұрын
Great video! If you 're TSing issues regarding Window Size and Packet Loss (to double-check if the TCP window size is not getting slammed on the receiver, and on the very rare occasion vice versa). select under 'Statistics - TCP Stream Graphs - Window Scaling', this a good tool to measure and view the respective Window scaling between C/S and S/C. I think Chris made a video of it years ago! I hope this helps :)
@serxhioshani38628 ай бұрын
Much appreciations guys! Patiently waiting for that SACK video
@ChrisGreer8 ай бұрын
This is a great idea.
@psypherpro4 ай бұрын
For me the way Chris explain it is so excellent and informative.
@scottspa748 ай бұрын
I love when you have chris on. I bought tye course he did with wireshark and nmap, just havent had time to start it, yet. Busy with ccna study and tls study with Ed Harmoush. When chris goes 'on tangents' it's an excellent learning opportunity. Would gave liked a bit more on the relationship between segment size and window size in tcp. Would also like to see more about QUIC. Thanks.
@anuragvashishth15645 ай бұрын
Fantastic Chris for the wonderful troubleshooting session.
@secinject8148 ай бұрын
Good to hear an ad for a VPN that's really just about what it's main function is, which is encrypting traffic. You can build one at home with a raspberry pi if you can find one, you just wont have the geolocation hopping. It is just a good first line of defense against attacks, as letting people know your IP can let them possibly wreak havoc on your device.
@Nicksegura-s1c3 ай бұрын
I love the real world tangents, especially if they are heavily technically based. Much love, and thank you for the wealth of information.
@takistmr8 ай бұрын
Great content, as always David and Chris! I will stay on one point: "...let's buy training instead of a lot of equipment!"
@trainwreck18278 ай бұрын
What a G! Thanks for introducing me to this guy. I've been using WS for years and it's nice to pick up some new tricks.
@davidbombal8 ай бұрын
You're welcome! Chris is the person to follow if you want to learn about Wireshark.
@rap1z8 ай бұрын
I love chris, hes always trying to just teach us stuff but like actually without peddling shitloads of courses and shit
@NetworkNinja1118 ай бұрын
Great video!! I do like when he gets straight to the point though. The tangents throw me off cause I lose focus. When he gets straight to the point I feel like gain so much knowledge and light bulbs start going off. Thanks again for this amazing content!!
@ChrisGreer8 ай бұрын
That is great feedback, thank you!
@tgrav38 ай бұрын
This is so awesome! @Chris, I support the detailed tangents!
@davidbombal8 ай бұрын
Glad you enjoyed the video!
@georgecherogiorgos48207 ай бұрын
Great stuff! Really enjoyed Chris' analysis! Keep 'em coming!
@TheChad178 ай бұрын
Great work. Your videos keep me entertained and interested. Thank you again.
@davidbombal8 ай бұрын
Glad to hear it!
@Cole987Turner8 ай бұрын
Thanks to you both for this video!!! Had a problem, which seems to be a very similiar to this and I used your technique to troubleshoot! Thank you very much!! :)
@dandele1238 ай бұрын
More Chris Greer videos! His content is awesome. Post more on your own channel Chris!
@ChrisGreer8 ай бұрын
I know… 😆 thanks for calling me out!
@joechen94988 ай бұрын
Thank you guys. you made packet analysis interesting. Definitely checking on Chris's channel and learn more about Wireshark.
@MuhammadUsman-xx2ef8 ай бұрын
Really fantastic video and good to see Chris x David again. David please invite Neal Bridges again and talk about Cybersecurity and how AI is shifting the paradigms of the Cybersecurity Thanks and Love from Pakistan ❤
@diptiranjansahoo52788 ай бұрын
Hey David and Chris, You both are awesome. Thanks for all these videos. Chris, you are looking cool with your new beard style 😊..
@gamereditor59ner228 ай бұрын
That's cool! Thank you for the tricks!! I will use wireshark to understand in depth of packets!
@Traumatree8 ай бұрын
If you had mention VirtualBox at the beginning, I wouldn't even need to check the pcap lol Great video guys thx!
@anonymousperson451528 ай бұрын
Really enjoyed video! Thanks for both of you guys for these informative content.
@RadAlzyoud8 ай бұрын
Brilliant. And Chris, you got yourself a new subscriber. Thx for sharing both.
@pmanolak8 ай бұрын
Brilliant video as usual. David and Chris are so sweet persons and have the ability to pass their knowledge. and that's make the difference!! You can be a great scientist, but if you dont have the ability to spread your knowledge, you cant be a good teacher.
@stardavos8 ай бұрын
Keep on tangenting. Thats what they made 1.5x speed for
@pcap_pirate9608 ай бұрын
Hands on is the Best way to learn, build home labs small or large testing stuff on that and watching what it does is when you can really grasp this stuff.
@mikkio53718 ай бұрын
I enjoy listening to both you guys
@stylis6668 ай бұрын
I really like it, a lot! You know, those detailed tangents. An explanation of how an application works and what you can use it for is nice, but if you skip those tangents, I will not know why everything I see is or behaves just slightly different from what you're explaining. I'd have to look up every single detail that you explain in those tangents. But if you have physical access to the network, can't you then just hook up to the wire that is going into your modem or coming out of your modem to see what packages are sent from the server?
@ged44408 ай бұрын
On all of the web, you guys are the best!
@MyDancingirl8 ай бұрын
Great interview and tutorial! Many helpful insights 💎
@davidbombal8 ай бұрын
Glad you enjoyed it!
@LiquidShepard8 ай бұрын
Love youre content David, ure my example of a hero!
@nawlaynawlay47228 ай бұрын
Thank you for sharing your knowledge and experience.
@jonathantx6 ай бұрын
Like always this content with chris is spot on and awesome. BTW tangents are awesome, they help out a bunch.👍, I wish I could give these videos more than 1 thumbs up LOL
@A..n..d..y8 ай бұрын
I really enjoy this. Wireshark is such an important tool.
@ignacioserrano72953 ай бұрын
Thank you very much for the video you made; I learn a lot!
@OurSpaceshipEarth7 ай бұрын
"Ya I had 'er, and all I got was.. EVERYTHING!" Low level? Well I did turn on my physical connector's Promiscuous mode! Rocked that Packet Capture all night! After all; "PCAPs or it's fake!".
@Abduselam.m8 ай бұрын
David thanks you can improve my education
@heraldbygrace8 ай бұрын
Thanks Chris and David!!! This seems like a murder mystery thriller movie to me. lol. 🤣🤣🤣
@feiwoza8 ай бұрын
Chris you look better with the beard :) - thank you David and Chris for this ...
@mahdihasan422 ай бұрын
This person did not invest money on Wireshark, but he owns it.
@majiddehbi91868 ай бұрын
Great to see u guys again
@k_usuan8 ай бұрын
Great content and bravo! And oh your video editing is top top 🔥
@davidbombal8 ай бұрын
Glad you liked it!!
@joerockhead72468 ай бұрын
my fav. thanks, david, & chris.
@stupedcraig7 ай бұрын
Can you do one on BGP and Slow Peer for troubleshooting slow networks?
@pinojuanka8 ай бұрын
Hello David, greetings from Chile, a query do you know of any book that you recommend that talks about the study of packages?
@Unique-m4z8 ай бұрын
eagerly waiting for stuff like that from you
@aguchnaka2928 ай бұрын
Thank you David and Chris. What about the QUIC protocol, what is your opinion? Should we use it instead of the good old TCP?
@ChrisGreer8 ай бұрын
It's a good question. Over the web, many services are switching to QUIC under our noses. If it is an internal enterprise application, it may not be worth the switch unless users are widely distributed over unreliable networks. That is where QUIC can outshine TCP. For for general use, TCP is just fine. Most of TCP lives on within QUIC anyway. Thanks for asking!
@aguchnaka2928 ай бұрын
Thank you Chris, but isn't the QUIC build on top of the UDP? @@ChrisGreer
@jacobhenriksen23248 ай бұрын
I would love to see how to troubleshoot asymmetric routing that is messing up TCP handshakes, using Wireshark
@rutgrrr51358 ай бұрын
Hey David, love your content. But please try to not interrupt your guest when they are talking. Thx in advance.
@ericheydemann95567 ай бұрын
Good work out of you both 👍👍👍
@davidbombal7 ай бұрын
Thank you!
@YusriCassim8 ай бұрын
Great learning this morning weekend thank you sir for sharing this tutorial video it’s makes me inspired by this video sir 32:41
@GeoPeter8 ай бұрын
Super valuable video! Thanks!
@S0U1SB4N3.6 ай бұрын
yes please share details and rabbit trails !
@jesperhansen74748 ай бұрын
keep it up with the details in wireshark. I need to lean nore :)
@karanb20678 ай бұрын
Idea for another video : covering active directory authorizations or AD attacks
@khanabdulmuhammad56258 ай бұрын
Chris is Awesome
@davidbombal8 ай бұрын
Agreed!
@cyberdefenseddi8 ай бұрын
Enjoyed the content! 😎👊 “it’s always DNS”
@magpieenterprise6781Ай бұрын
Hi Chris or Dave: At 32:39 you say we are dealing with two 1460s but I see 14060. Can you clarify this for me? How is 14060 adding up to 2920? Thanks
@raghavendrag61526 ай бұрын
Thanks Chris
@ctrlaltdel32218 ай бұрын
Watching now!
@Polandisch8 ай бұрын
Great video. Thank you.
@davidbombal8 ай бұрын
Glad you liked it!
@lisa221507 ай бұрын
I am feeling dirty for thinking Chris is incredibly hot. But seriously, these videos are amazing and I cannot wait to learn more. You guys make the dull into the fascinating.
@notaras19856 ай бұрын
28:50 what usually causes the segmentation or reassembly issues?
@Zedorek8 ай бұрын
so what was shaping the packet? which virtual setting on the host was responsible for this?
@RicardoJames-l8r8 ай бұрын
Hi, Does these same techniques apply to WAN networks?
@rishiraj25488 ай бұрын
Thanks
@davidbombal8 ай бұрын
You're welcome!
@sinenomine91437 ай бұрын
There is one thing I want to know more about. Thats VPN traffic and how a server can ses there is VPN traffic and how to hide the VPN traffic from the server. Perhaps hide your VPN traffic as HTTPS traffic?
@savagepro90608 ай бұрын
Can AI disguise as packets? Hmm, that is the future question!
@GuruImperium8 ай бұрын
A very good question to ponder on. This will be a possibility in years to come and people will look back on this question with delight.
@LilMr.E8 ай бұрын
Lol. Or it was never A.i in the first place. And it WAS ALWAYS PACKETS. A.i = automated packet system . The rest of the hype is Hollywood trained
@AD-nm7ne8 ай бұрын
Even half a year from now is the future.
@alawiabbas93868 ай бұрын
I want to start into cyber security, from where should i start
@JamesJukich6 ай бұрын
how did you get the TCP Segment Length column?
@IrishOverkilled8 ай бұрын
It was over 5 minutes and we weren't in a pcap file... 😮😅
@TheChad178 ай бұрын
Can you please give me a quick synopsis of why Proton VPN compared to someone like Nord VPN? I know proton is a sponsor, but I believe you can provide some of what I’m asking about. Am I able to get more granular with proton as compared to Nord?
@dc8official8 ай бұрын
Chris got beards now ...... lovely
@OurSpaceshipEarth7 ай бұрын
Best Wireshark Howto EVER. +bonus TCP SYN ACK analysis, hit _that_ spot by bringing out an RFC reference. So dope good content man tangent detail Approved [ACK]. =:r[]