Thank you for everything, David. After two years in college I was just hired last week as a remote Web and Mobile App Designer and Developer. Because I am also OSCP certified, it drastically raised my salary and the fun level of my position. And a lot of your courses are to thank for this; college is just for the paper or "degrees"."
@davidbombal3 жыл бұрын
That is awesome! Congratulations!!!
@SystemDemon3 жыл бұрын
These are blessing comments! David is my IT hero and my life is changing as well. I say David is making art, and we cant thank him enough!
@warrioratthewall19692 жыл бұрын
I like when you ask questions David. It's often something I'm wanting to ask, or sometimes something I should be asking but didnt even ask in my mind. Thanks again!
@CyberNancy3 жыл бұрын
Solid content. Knowing what normal/innocuous traffic patterns look like helps you identify the suspicious traffic patterns. Chris's focus on TTL, window size, and sequence numbers is a really great example of how a seasoned analyst approaches pcap.
@itech_live3 жыл бұрын
I came across to this demo, it was really helpful for me to learn about Maxmind and integrated to my Wireshark. Thanks to you and your host for put time on making this video.
@Pay-No-Mind Жыл бұрын
In response to the question, I'd prefer if you wrote/noted the questions for later and just let the person talk because you never know what cool lessons/tips/stories you missed out on because their flow/train of thought was stopped. Just pick up at the end LOVE the content! This has me busy and working towards real goals out of deep pit of depression I've been in for years, thank you David :)
@piotrwikarski94013 жыл бұрын
Thank you guys for collaborating. Chris Greer is amazing. Strange that I never came across him before. Thanks again!
@brianturney21242 жыл бұрын
This is great. I love it when you ask lots of questions. I am usually asking the same ones in my head. Perfect!
@sergeyshevtsov51253 жыл бұрын
David, every video you make is non trivial and some kind of fantastic. Thanks Chris for sharing knowledge!
@TheStsparrow3 жыл бұрын
Something to note: Industrial control system protocols commonly utilize 20 byte header lengths. It's done for efficiency. But arguably they don't generally run on TCP port 80.... and hopefully not over the internet. Great video guys
@warrioratthewall19692 жыл бұрын
Like BACnet?
@Alain9-13 жыл бұрын
please don't let down those long video version i've enjoyed them a lot and waiting for more ( TCP/IP, scapy, Linux ...) 🔥🔥
@GenXpress Жыл бұрын
Thank you, David, and in this video Chris too. Your content is great, and I been following you for a while....Keep it up and keep it coming :)
@marcorossi2664 Жыл бұрын
Grazie David per i contenuti che divulghi....io sono Italiano e ti seguo da un po...mi hai aperto un mondo....😊
@jaimerosariojusticia3 жыл бұрын
Questions. Always ask, even if is a "dumb" one. The answer is what matters and what is needed. Great video (even the first 5 min are good enough) Thanks again David Bombal.
@davidbombal3 жыл бұрын
Thank you. I'll do that 😄
@rusnakhraj74012 жыл бұрын
For me I prefer if u r asking question around because it gives us more information and it can help us understand topic better from other point of view. And I see that you have really good questions from student point of view David.
@samjones43272 жыл бұрын
Another awesome video!!! Thank you guys for showing us how to read and interpret the packet capture in wireshark!!! I have a new and easier understanding of what I am looking at! Supurb explanation! Now I have a new toy through GOIP!! I would love to see NMAP in action in wireshark! Thanks David and Chris! Cheers!
@dwaynesudduth10283 жыл бұрын
Fantastic content once again, proving that you are a top-tier content creator for IT. Thank you and thank you Chris Greer!!
@tommyd222773 жыл бұрын
David this was fantastic! I enjoyed that a lot. Keep bringing the excellent content. I really appreciate you!
@Denverbi113 жыл бұрын
Great video. Great Collaboration. I would really enjoy the nmap analysis.
@albanselaj7333 жыл бұрын
Thanks, David and Chris! Amazing content that helps us a lot in our everyday work!
@majiddehbi91863 жыл бұрын
Such pleasure its real chrismus to have u here guys its so instructive God bless u
@davidbombal3 жыл бұрын
Thank you Majid!
@naesone2653 Жыл бұрын
Bunch of questions is great david thank you
@vyasG3 жыл бұрын
Thank you David and Chris for this amazing video. Very useful content.
@aquadir28303 жыл бұрын
Thank you so much David.. I'm a big fan of yours.. Happy merry Christmas 🎄..
@marcsuhling93173 жыл бұрын
wow this is so interesting to watch and learn from the pros. thanks david for this video.
@amirchegg3 жыл бұрын
As always, Thank you David! If you can please do a walkthrough series on Kali Linux Tools, that would be awesome. There was a video where you showed us how to use Wifite properly, how to configure it and also how to troubleshoot common problems (which i think is a phenomenon! No-one bothers itself to explain how to solve those problems, but you did make a separate video just to show us how to fix problems we all have encountered while working with that tool). Sience many people want to learn ethical hacking and this channel is by far my favorite resource, making a series of videos explaining each and every tool that is shipped with Kali has a really good potential. Also, the way you explain things is absolutely incredible and makes difficult things to be super easy to grasp. Thats the main reason why im asking you for this! Ive got nothing more to say and im really looking forward to see those videos!
@davidbombal3 жыл бұрын
Thank you. Great suggestion 😄
@gamershubke69823 жыл бұрын
Love your videos since day one I have learnt alot from you continue doing this great work 💪
@skriptak63082 жыл бұрын
I can't tell if that's just David's personality, but I notice he's one of those people that talk over you in a Convo lol ... Chris can't get out a full sentence before David interrupts him ..either way both of these guys are brilliant as well as the video ...love it !
@patrickilunga33123 жыл бұрын
Thanks David after 6 months moving in US I got job RTP because I am also CCNA certified.
@davidbombal3 жыл бұрын
Huge congratulations Patrick! Well done!
@gibsonswe3 жыл бұрын
Love these videos! Could watch for hours
@tarrylim7783 жыл бұрын
Excited next video with how nmap scan
@nallachi29133 жыл бұрын
Nice conversation both of you chris and DB❤️❤️❤️ are marvelous stuff giving persons
@davidbombal3 жыл бұрын
Thank you. Lots of fun talking with Chris about Wireshark 😄
@jointherevolution55772 жыл бұрын
Very good work mate! helped a lot with a uni assignment!
@planetbobful3 жыл бұрын
Great vid - lekker man! Love the Blue Hat training vids - greatly appreciated!
@davidbombal3 жыл бұрын
Happy to hear that :)
@batreilangrynjah25263 жыл бұрын
thank you David for this I learned a lot ..want some more videos like this
@kjetilandreedstrm16783 жыл бұрын
Hi! Great video! I was blown away over this! But it might be just me that is a complete noob. I just find a TCP-handshake file with 15 packets in the WireShark-link above? Should it not be the complete file from the attack Chris is using in the video?
@davidbombal3 жыл бұрын
Thanks. Please try this link: davidbombal.wiki/tcphackers1 - looks like I made a mistake :(
@kjetilandreedstrm16783 жыл бұрын
@@davidbombal Hm. It looks like this link is directing to the same file as the other link??
@zioleo90933 жыл бұрын
Same File , Just 15 packets.
@tmusic992 жыл бұрын
Very interesting. I have done a lot of statistical analysis in other domains. Would love to see more statistical analysis examples in Wireshark. And how to export data, filtered or not filtered, to a statistical analysis package.
@avjyots26012 жыл бұрын
Amazing analysis, thanks 👍
@tahersadeghi6773 Жыл бұрын
Hey Chris. In this video, you mention a low number in a suspicious 34000 range. Is this number randomly chosen by the server, browser, or person initiating the packet? and what if this number was in the high number range?
@glenp423 жыл бұрын
Q: Can we get copies of the wireshark profiles used?
@FJB_KJV9 ай бұрын
I can imagine a lot more utility then just for attacks. Makes me think of EtherPeek IP Maps, the old sniffer pro ip matrix or Skitter application that is or used to be available via CAIDA - pretty cool. Did not know that feature set was available for Wireshark
@anthonyjohnson26073 жыл бұрын
keep on asking questions david, we all have the same questions!
@Andrew-mh6cl3 жыл бұрын
Congrats sir we ill reach soon 1million best wishes master. ❤️❤️❤️❤️❤️❤️❤️
@davidbombal3 жыл бұрын
Thank you!
@itsme75703 жыл бұрын
Sometimes David asks very basic questions but I guess it doesn't hurt
@ranganathannandakumar4463 Жыл бұрын
This is GOLD! Thank you!
@fifthamendment1 Жыл бұрын
If the TTL number is close, would it not mean that the source is from the same location? Perhaps the hops were changed up a bit such as sent through various VPNs?
@gilbertohernandez92233 жыл бұрын
Do you have a podcast by chance? I enjoy hearing you talk about anything computers related.
@groovetrain3973 жыл бұрын
Ok thats great guys, so how do we block it!??
@Whit3hat7 ай бұрын
Ask away David, most cases what I was thinking thx
@faran_siddiqui-d3t3 жыл бұрын
David and chris are the best
@davidbombal3 жыл бұрын
Thank you!
@majiddehbi91863 жыл бұрын
One more question for Chris what's u re idealy profile in whshark in order to get a max of infos when we try to track the wierd packets thx
@davidbombal3 жыл бұрын
I'll ask Chris to cover Wireshark profiles in another video 😄
@majiddehbi91863 жыл бұрын
@@davidbombal GOd bless u David and have wonderful Christmas with all u re be loved ones
@trevorhenrytrey3 жыл бұрын
How do you stop the traffic once you notice this is not normal traffic. Or it's not real time analysis
@RayzDEV3 жыл бұрын
Thanks for video :) very informative.
@davidbombal3 жыл бұрын
Glad it was helpful!
@symshark3 жыл бұрын
The trace file in the download link only contains the TCP Handshake with 15 packets. Is the trace file used in this video available to download?
@davidbombal3 жыл бұрын
Please try again using this link: davidbombal.wiki/tcphackers1 - NOTE please that your browser may cache the incorrect link so you may need to use a private / incognito window or different browser if it doesn't work for you
@SuperPrabhdeepsingh3 жыл бұрын
what a video!! Go for nmap for the next video
@mouridmostapha93783 жыл бұрын
You the best david keep 🔥❤
@smokestudio14083 жыл бұрын
Really interesting stuff ☺️
@davidbombal3 жыл бұрын
Thank you!
@ThePumbaadk3 жыл бұрын
What a great video, very nice 👍🏻
@davidbombal3 жыл бұрын
Thank you very much!
@Ak4sh073 жыл бұрын
Love You David Bombal
@davidbombal3 жыл бұрын
Thank you!
@joerockhead724611 ай бұрын
more Chris. more Chris. more Chris.
@scottsparling25912 жыл бұрын
so, if UDP is connection-less, but QUIC is happening over UDP, AND has a connection ID and session ID (TLS), are we now to consider UDP in some cases connection oriented, or just consider QUIC connection oriented? I hope my question makes sense to others.
@vivekkrishnan9794 Жыл бұрын
From my understanding, quic is a protocol with connection oriented properties running over udp. UDP itself is not connection oriented
@killerx89023 жыл бұрын
Great stuff and I vote for nmap
@jackjohn83233 жыл бұрын
Can you share the link to PCAP file please. The one shared only has the Videos but not PCAP
@davidbombal3 жыл бұрын
Thanks. I've fixed the link. Please download again. davidbombal.wiki/tcphackers1
@KevinCrabb3 жыл бұрын
Hi, David and Chris, I'm having a hard time making it work on my Windows version of Wireshark. I downloaded it for MMDB but it was formatted in tar.gz not .mmdb. So I formatted it to .mmdb, point it to my path folder, restarted Wireshark but no luck. Is there something I'm missing?
@davidbombal3 жыл бұрын
There was a problem with the download link. Please try downloading again using the Dropbox link in the video description. It is a zip file that you need to download
@danynite97363 жыл бұрын
Hello David I have a problem with Kali Linux in VMBox. When I use firefox, my CPU is 100% overloaded . What can I do against it?
@Firoz9003 жыл бұрын
Great. Thank you guru.
@SOC_Pavi3 жыл бұрын
Hello David, Seems the pcap file that was uploaded to Dropbox only showing 15 packets. I not applied any filters. Could you please check and assist on this.
@davidbombal3 жыл бұрын
Please try this link: davidbombal.wiki/tcphackers1
@zioleo90933 жыл бұрын
@@davidbombal Same 15 Packets only. 😢
@SOC_Pavi3 жыл бұрын
@@davidbombalOnly 15 packets in the PCAP file
@davidbombal3 жыл бұрын
Legit TCP flows or hacking attacks? Can Wireshark help us to decode the flows and see if the traffic is malicious? // WIRESHARK FILE // Download here: www.dropbox.com/s/pvytdvkvxl8b41n/SYNScan_GeoIP_ChrisGreer.pcapng.zip?dl=0 // MAXMIND // How to: wiki.wireshark.org/HowToUseGeoIP Maxmind: www.maxmind.com/en/home // MY STUFF // www.amazon.com/shop/davidbombal // SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal KZbin: kzbin.info //CHRIS GREER // Udemy course: davidbombal.wiki/chriswireshark LinkedIn: www.linkedin.com/in/cgreer/ KZbin: kzbin.info Twitter: twitter.com/packetpioneer // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
@mmaranta785 Жыл бұрын
Wonderful!
@chris76913 жыл бұрын
LOTS OF QUESTIONS
@refaiabdeen59432 жыл бұрын
Cheers Mate.
@Thriller6273 жыл бұрын
Cheers! P;S. Keep on asking questions.. d ; } #DavidBombal
@UrRealestCritic3 жыл бұрын
Can I use witeshark on the new M1 MacBook?
@gabethedog40433 жыл бұрын
yes
@UrRealestCritic3 жыл бұрын
@@gabethedog4043 thanks bro.
@omkhard18333 жыл бұрын
Great Video Sir David ....
@davidbombal3 жыл бұрын
Glad you liked it!
@juanrodriguez8253 жыл бұрын
Nmap
@technoman99263 жыл бұрын
Print ("hello David")
@davidbombal3 жыл бұрын
Hello!
@JarppaGuru2 жыл бұрын
3:50 now give compare very popular website are they 1 second part.
@mohamedaymenzebouchi3 жыл бұрын
Yeh, ask questions
@davidbombal3 жыл бұрын
Thanks. I'll do that 😄
@tyalva18142 жыл бұрын
phone verification not working on discord
@sohilshrestha30893 жыл бұрын
how to stop my terminal from saving history in kali linux 2021.4
@vikpa12112 ай бұрын
I think machine learning algorithms can detect those types of patterns and malicious traffic in real time
@Ak4sh073 жыл бұрын
Great Content
@davidbombal3 жыл бұрын
Thank you!
@omharwalkar48683 жыл бұрын
Sir how to hack any Android phone by sending image file. It's possible
@shlokjhunjhunwala70823 жыл бұрын
Is it possible?
@hack4peace3 жыл бұрын
Yes
@raghavendraraaghu79083 жыл бұрын
No it's not possible since we can't have a backdoor like processing the payload as a backdoor when the img is opened if I'm not wrong!
@omharwalkar48683 жыл бұрын
@@shlokjhunjhunwala7082 but how
@omharwalkar48683 жыл бұрын
@@hack4peace but how
@yeteldonn46492 жыл бұрын
thx u.
@ashersilver73882 жыл бұрын
I havnt watched the whole video. But yes, ASK AWAY!!!
@adolfor54273 жыл бұрын
Mannnn, this is just cool
@alapanroy1114 Жыл бұрын
I want question ans conversion
@fairplay83473 жыл бұрын
Sir Love from India Iam a CCNP student Should I learn python for future
@originals27473 жыл бұрын
informative
@davidbombal3 жыл бұрын
Glad you enjoyed the video 😄
@fahadbawazir17713 жыл бұрын
David sir, I like that..
@davidbombal3 жыл бұрын
Really happy to hear that
@ArSiddharth3 жыл бұрын
I have a question, I'm a beginner, And I do not understand where should I start, from where should I study? I don't understand anything..... Love❤️ from india 🇮🇳
@davidbombal3 жыл бұрын
Network+ or CCNA are a great way to start learning basics. Watch this video for more tips: kzbin.info/www/bejne/iXfFh2qpibh0oqM
@ArSiddharth3 жыл бұрын
@@davidbombal ohh men, thanks a lot, I didn't think you would reply to my comment ,Thanks sir, ♥️♥️