Decoding Packets with Wireshark

  Рет қаралды 179,210

Mike Pennacchi

Mike Pennacchi

Күн бұрын

In this live event I will be playing with Wireshark. I'll go through where to capture, what to capture, and the basics of decoding the traffic. It will be a fun and interactive event!

Пікірлер: 63
@rongliao9255
@rongliao9255 4 жыл бұрын
Great tutorial especially on DNS troubleshooting! Thanks a lot!
@chrishubalek7068
@chrishubalek7068 4 жыл бұрын
Very impressive
@matthewjon4477
@matthewjon4477 4 жыл бұрын
Got a link to that amazon page?
@trenholmelodge1820
@trenholmelodge1820 6 ай бұрын
as with a lot of these videos you know it so well you just scoot around the screen and say things like "go here and then here" etc. Please slow down and explain what to you is obvious. For a newbie, we do not know most of the basics and that is why we are watching. for the most part good explanations but show us how you got there. ie now we send the trace again. th anks
@bobbyb42
@bobbyb42 3 жыл бұрын
I thought this whole video was great, but my favorite part may have been at the end when you made yourself way bigger to emphasize the importance of capturing packets and learning everything before actual issues happen. I actually laughed out loud from seeing you become giant all of a sudden. Thank you for that.
@AvinashKumar-pw3bd
@AvinashKumar-pw3bd 6 жыл бұрын
The way you are teaching is great, I am new to Wireshark, but the way you conveyed the topic is great. Sir, please let me your another video. I want to start learning Wireshark from scratch till end means as a beginner till a fresher expert needed in Companies. I have worked as Network Engineer for two years and switching to Cyber Security. Currently a student at University. Your guidance would be of great help.
@dankwaclark3133
@dankwaclark3133 10 ай бұрын
the content in the hex needs to be decoded and converted into messageFrame
@dankwaclark3133
@dankwaclark3133 10 ай бұрын
Please can you elaborate on how to decode the hex in each frame.
@xanvong1501
@xanvong1501 3 жыл бұрын
Thank you so much ! very informative video !
@JohnSmith-ds7oi
@JohnSmith-ds7oi 4 жыл бұрын
He used a 15 year old trace file because everything is compressed and https now.
@MikePennacchi
@MikePennacchi 4 жыл бұрын
That and it has some good examples of packet loss and the TCP retransmission timer in action. I probably should update some of those. Good news is that TCP hasn't changed much in the last 15 years.
@samthesplatt
@samthesplatt 6 жыл бұрын
Thank you. Really nicely explained. Liked the DNS server tip.
@iforwms
@iforwms 4 жыл бұрын
Very interesting and well made. Thanks a lot!
@qzorn4440
@qzorn4440 3 жыл бұрын
nice info.. i am interested in checking PLC packets in controllogix, automationDirect, HMI-touch-screens, Modbus, ethernet, etc. like some of the Fluke pricey stuff. thanks
@hughhodges5924
@hughhodges5924 3 жыл бұрын
Very well done practical presentation of Wire Shark .Will you be attending the Cyber Symposium in Sioux Falls, SD on Aug 11,11,12?
@touchthesky9657
@touchthesky9657 5 жыл бұрын
Great work an information... Thank you very much Mike
@tahersadeghi6773
@tahersadeghi6773 Жыл бұрын
Hi Mike. God bless you, man. This is the video I have been searching for quite some time. It is so clear and so easy to understand. Especially the fact that you dismiss the color which has been an annoyance in almost all the rest of the videos on Wireshark. Many thanks
@itdirector8526
@itdirector8526 Жыл бұрын
Great video. Understanding the significance of the capture was exactly what I was looking for. Good work!
@yt_legend_papa
@yt_legend_papa 4 жыл бұрын
Hi, I know long time agoi since the video was provided but is it possible to get the PCAP Files? the link below does not have it
@LarryH2
@LarryH2 6 жыл бұрын
Great video! Very easy to watch and understand. This was a great refresher for me.
@rono7993
@rono7993 3 жыл бұрын
how should one analyse captured wireshark and give report
@kedabro1957
@kedabro1957 4 жыл бұрын
This guy's speech has shades of Jeff Goldblum.
@gyt7504
@gyt7504 2 жыл бұрын
great video; learnt so much in short time. thanks.
@r3dbullweiss488
@r3dbullweiss488 6 жыл бұрын
Hi, I'm really new to wireshark (got it about two days ago)... and for some reason I can't decrypt the packets, I've already entered a WPA-pwd (in a valid format, checked it multiple times) , yet only some packets seem to be decrypet, while most stay encrypted.... I well aware of the 4 way handsahke and wireshark needing to capture the device connect to the internet in order to decrypt it.. Which I've tried doing waayyy to many times (probably spend more than 6 hours trying) I'm really confused on how wireshark is supposed to capture the 4 way handshake, am I supposed to connect to the internet with my laptop, start wireshark and then boot up the device I want to analysis/watch it's traffic or am I supposed to capture my laptop connecting to the internet ( btw my laptop is connected via wifi and the target device it connected via lan cable). Don't mind the run on sentence and typos, I'm in quite a hurry... ^_^
@TriEdgeGaming
@TriEdgeGaming 4 жыл бұрын
Ive never worked with a tap before much less a fault tolerant tap. So its basically a small switch that has redundant Ethernet connections to the source. Do these types of taps have redundant power somehow? like a battery? I imagine having two power supplies connected to the same wall is pointless since the 2 wall outlets you're connecting to for power probably aren't redundant at all.
@MikePennacchi
@MikePennacchi 4 жыл бұрын
These taps have relays in them that are held open by the power. When they lose power, the relay closes and bypasses the electronics in the tap. It will pass data, but can't be used for monitoring, when power is lost.
@satisfieduser2696
@satisfieduser2696 3 жыл бұрын
why wouldn't you just use some 18650's
@rajstudying6450
@rajstudying6450 3 жыл бұрын
can you explain what is protected payloads
@johnbrandt2167
@johnbrandt2167 4 жыл бұрын
AT about 27:00, I don't understand how we can definitively conclude that the problem is with the server. How can we assume that the 4.8 seconds it took to get the packet back is due to server processing time? What about the network path, can we be sure that the path back is the same as the path to?
@MikePennacchi
@MikePennacchi 4 жыл бұрын
John, good point. Since we received the ACK back, we have a pretty good idea of the round trip time of the circuit. While it is possible that it took a different path to get back, we would not expect a significant increase in the latency added by the network. If it were a few milliseconds different, that could be explained by network path. Once we start getting into seconds, it will be on the server side. I've always joked there is no Packet Lounge on the network. There really isn't a place that could buffer up packets for 4.8 seconds on the Internet.
@sadboisushi
@sadboisushi 4 жыл бұрын
GOLDBERG sure does know a lot
@pankajjain493
@pankajjain493 4 жыл бұрын
wow its a great video and trouble shooting thanks
@kieran.stafford
@kieran.stafford 4 жыл бұрын
No waffle, straight into real world usage examples. Finally a great Wireshark tutorial from someone who clearly knows their stuff and can communicate it well. Thank you.
@876inc
@876inc 5 жыл бұрын
I'm trying to find free host site webpages for my cellphone isp can you help me?
@elisavetkonstantopoulou5386
@elisavetkonstantopoulou5386 3 жыл бұрын
Hi! When I click 'Follow TCP Stream' instead of showing me the info it shows you, it shows me some gibberish... Do you know what that is? I'm using Ubuntu.
@MikePennacchi
@MikePennacchi 3 жыл бұрын
Follow TCP Stream creates a filter on the TCP conversation and reassembles the data portion of the packets. In the case of protocols such as HTTP and SMTP, we can often see the clear text contents of the packets. Unfortunately, when we are assembling protocols such as HTTPS, the traffic in the packets is encrypted and comes out as gibberish. In that case, I just close the packet contents window and work on analyzing the flow of packets. As time goes on, more and more traffic is encrypted and that window serves less of a purpose. Which is a big bummer.
@elisavetkonstantopoulou5386
@elisavetkonstantopoulou5386 3 жыл бұрын
@@MikePennacchi got it, thank you very much!!!
@malabatikhoisnam3435
@malabatikhoisnam3435 5 жыл бұрын
sir pls tell me the procedure for extracting RTP or SIP streams from USBPCAP..
@huanluo9074
@huanluo9074 4 жыл бұрын
Can you provide data packets?
@LifeGeneralist
@LifeGeneralist 6 жыл бұрын
Excellent video Mike.
@johnmcook1
@johnmcook1 5 жыл бұрын
where is the ( Decoding ) lol
@deejay7339
@deejay7339 3 жыл бұрын
Did you not watch the video? This is basic level information, but highly valuable.
@andyz1157
@andyz1157 5 жыл бұрын
Thank you for keeping this video on You Tube...very nicely explained.
@dhiahhadi
@dhiahhadi 3 жыл бұрын
two forty five //// 34:13
@hartobie3667
@hartobie3667 4 жыл бұрын
Nice deep dive on Wireshark.
@ravithushara
@ravithushara 2 жыл бұрын
Thanks a lot. Very
@jimjulian4443
@jimjulian4443 4 жыл бұрын
How did you set up a "fault tolerant tap?"
@muaamaraltaweel3403
@muaamaraltaweel3403 2 жыл бұрын
Thank you very much
@wedontforgetwedontforgive5838
@wedontforgetwedontforgive5838 6 жыл бұрын
Thanks sir
@jamesgiaquinto3907
@jamesgiaquinto3907 2 жыл бұрын
Top shelf as always.
@paulmorrey733
@paulmorrey733 5 жыл бұрын
Great Video New to wire shark so a great start for me
@brunoagostinho7204
@brunoagostinho7204 5 жыл бұрын
Where can I find pcap files to download and analyze?
@MikePennacchi
@MikePennacchi 5 жыл бұрын
Here is a great source for sample capture files - wiki.wireshark.org/SampleCaptures
@ravindrap7962
@ravindrap7962 3 жыл бұрын
Great Video
@ramchhabra5694
@ramchhabra5694 4 жыл бұрын
23:45
@Juancholoco710
@Juancholoco710 4 жыл бұрын
20:11 after i follow TCP i get to that window but mine looks encrypted
@rob7328
@rob7328 4 жыл бұрын
On the bottom of that window try changing, "Show and save data as" to Hex dump or something else. Otherwise make sure you have added the WEP and WPA decryption keys under preferences>protocols>IEEE 802.11>"Decryption keys: Edit...". There are videos on here about how to do this that explain in more detail.
@atzilut540
@atzilut540 5 жыл бұрын
how did you rip off your thumb nail?
@socrates_the_great6209
@socrates_the_great6209 5 жыл бұрын
The first part is useless. Since when did the power suddenly go off? We live in 2019 man.
@abde999
@abde999 5 жыл бұрын
easy for u to say, u don't live in a 3rd world country
@dionjeremy1711
@dionjeremy1711 4 жыл бұрын
@@abde999 it's called a generator it's not rocket science.
@rob7328
@rob7328 4 жыл бұрын
power never went out in 1700 but its going out now... smh
Wireshark - Malware traffic Analysis
16:01
Hack eXPlorer
Рет қаралды 200 М.
TCP Fundamentals Part 1 // TCP/IP Explained with Wireshark
1:17:24
Chris Greer
Рет қаралды 437 М.
The day of the sea 😂 #shorts by Leisi Crazy
00:22
Leisi Crazy
Рет қаралды 2,2 МЛН
🍉😋 #shorts
00:24
Денис Кукояка
Рет қаралды 3,5 МЛН
Mastering Wireshark: The Complete Tutorial!
54:30
Hacker Joe
Рет қаралды 262 М.
Wireshark Tutorial for Beginners | Network Scanning Made Easy
20:12
Anson Alexander
Рет қаралды 271 М.
Wireshark Course - Beginner to Advanced
37:12
CyberFlow
Рет қаралды 2,5 М.
Hands-On Traffic Analysis with Wireshark - Let's practice!
51:04
Chris Greer
Рет қаралды 35 М.
Spotting Packet Loss in Wireshark
15:16
Plaintext Packets
Рет қаралды 15 М.
UDP doesn't suck! It's the BEST L4 protocol for THESE types of applications...
11:52
01 - Network Troubleshooting from Scratch | Learn Wireshark @ SF22US
1:10:48
SharkFest Wireshark Developer and User Conference
Рет қаралды 71 М.
Network Security - Deep Dive Replay
3:08:19
Kevin Wallace Training, LLC
Рет қаралды 160 М.
BGP Deep Dive
2:10:28
Kevin Wallace Training, LLC
Рет қаралды 194 М.
The day of the sea 😂 #shorts by Leisi Crazy
00:22
Leisi Crazy
Рет қаралды 2,2 МЛН