Wireshark - Malware traffic Analysis

แชร์
ฝัง
  • เผยแพร่เมื่อ 26 ก.ย. 2024

ความคิดเห็น • 257

  • @phennessey3
    @phennessey3 2 ปีที่แล้ว +55

    This was more informative then my worthless college professor and textbook combined. Not only did I pass my lab because of this video, I also learned a lot. Thank you for sharing with us!!!!!!!!!!

  • @HazelJLMboya
    @HazelJLMboya 10 หลายเดือนก่อน +3

    I'm just 5mins into this and it's sooo helpful.Totally assisted in better understanding of wireshark. Thank you .
    NOT ALL HEROES WEAR CAPES!!!

  • @brooklynzoo81
    @brooklynzoo81 5 ปีที่แล้ว +35

    This was presented and broken down very well. Thank you ! Subscribed

    • @HackeXPlorer
      @HackeXPlorer  5 ปีที่แล้ว

      Thank you for your feedback, appreciate it.

    • @TirthPatel7923
      @TirthPatel7923 3 ปีที่แล้ว

      Hey bro, I have a project to do on Wireshark, I have to analyze the files, can you please help me out please, like we can meet on zoom

  • @theconcierge9301
    @theconcierge9301 3 ปีที่แล้ว +8

    that was the best explaination i´ve ever seen on youtube. bravo! you should bring more content out about wireshark and live examples. great!

  • @happyagain855
    @happyagain855 3 ปีที่แล้ว +14

    This the most informative, hands on video I've watched on this tube about this subject...Just amazing man. Thank you very much.

    • @HackeXPlorer
      @HackeXPlorer  3 ปีที่แล้ว

      Thank you for the valuable feedback :)

    • @jadielkyle6077
      @jadielkyle6077 3 ปีที่แล้ว

      I dont mean to be off topic but does someone know a trick to get back into an Instagram account?
      I was stupid forgot my password. I love any tips you can give me

  • @abdoumjid9122
    @abdoumjid9122 4 ปีที่แล้ว +9

    First of all, I want to thank you for the logical processes that you've shared here in this video, you have my subscription and like, and please make some playlists about every tool.

    • @HackeXPlorer
      @HackeXPlorer  4 ปีที่แล้ว

      Thankyou very much abdou 👍

  • @emmanuelmarosi3736
    @emmanuelmarosi3736 2 ปีที่แล้ว +1

    this is the best wireshark tutorial

  • @FrankTranDesign
    @FrankTranDesign 3 ปีที่แล้ว +3

    Dang, this is super informative. It's 2021, and this video is still ultra useful. Thank you!

    • @HackeXPlorer
      @HackeXPlorer  3 ปีที่แล้ว

      The source material i referred to was even older. But still this is the fundamentals 😁. But builds a strong foundation

  • @nicholegoh6574
    @nicholegoh6574 4 หลายเดือนก่อน

    life saver really was so lost with an assignment due tmr and chanced upon this video thanku sm !!

  • @tomasguagniniiglesias3798
    @tomasguagniniiglesias3798 ปีที่แล้ว +2

    Amazing, really clear, you are a great instructor. As I read on a comment below, I learned more from you in 16 min that from textbooks and professor in college

    • @HackeXPlorer
      @HackeXPlorer  ปีที่แล้ว +1

      Thank you for the feedback Tomas

  • @BiharCentralSchool
    @BiharCentralSchool 3 ปีที่แล้ว +1

    Absolutely Brilliant EXplanantion

  • @sambitsahoo1123
    @sambitsahoo1123 3 ปีที่แล้ว +1

    Careful! He's a hero!!! Subscribed !!!

  • @konulaslanova2608
    @konulaslanova2608 2 ปีที่แล้ว +1

    Excellent. You made it so clear.

  • @shafrinainn365
    @shafrinainn365 2 ปีที่แล้ว +1

    Very informative and very good explanation. Thank you.

    • @HackeXPlorer
      @HackeXPlorer  2 ปีที่แล้ว +1

      Thankyou Shafrina 👍👍

  • @rashmiraghukumar5821
    @rashmiraghukumar5821 ปีที่แล้ว

    Thanks, alot!!! for uploading this informative video, I really learned a lot about Wireshark ethereal

    • @HackeXPlorer
      @HackeXPlorer  ปีที่แล้ว

      Thanks for the feedback Rashmi 👍

  • @povadventures3740
    @povadventures3740 ปีที่แล้ว

    I've learned quite a bit knowledge on his analysis. I'm surprise this channel haven't blew up yet. Subscribed for more!! lets go!

  • @Cyber_Jagat
    @Cyber_Jagat ปีที่แล้ว

    I had been looking for this type of worth content and in this video you covered a lot. Thanks for a worthy video.

  • @hilkokriel5659
    @hilkokriel5659 3 ปีที่แล้ว +1

    WOW!! Crazy level of detail and new-user friendly. Thank you very much for uploading.

    • @HackeXPlorer
      @HackeXPlorer  3 ปีที่แล้ว

      You're very welcome! Hilko 👍

  • @skatetown100
    @skatetown100 3 ปีที่แล้ว +1

    Excellent .. just excellent !!!!! Thanks for this!!

  • @ruthawele2102
    @ruthawele2102 3 ปีที่แล้ว

    Omg this is the best malware capture vid for Wireshark, Thank you so much for explaining step-by-step. its really helped me in packet analysis and hunting. Thanks mate!!!

    • @HackeXPlorer
      @HackeXPlorer  3 ปีที่แล้ว

      You are welcome Ruth, thank-you for the feedback.

  • @Toczusiek
    @Toczusiek 3 ปีที่แล้ว +4

    You rock man, I needed it to do my university exercise. Thank you so much :)

    • @TirthPatel7923
      @TirthPatel7923 3 ปีที่แล้ว

      Hey bro, I have a project to do, analyzing the pcap files.. It would be nice of you if you can help me out. PLEASEEE, like we can do a google meet meeting or zoom or something that you like. PLEASE

    • @ashanlahiru8020
      @ashanlahiru8020 3 ปีที่แล้ว

      Hey bro, I want a help from both of you For my Uni Assignmnt.. Please Can You??

  • @josephnduati1214
    @josephnduati1214 4 ปีที่แล้ว +2

    Very well explained and demonstrated. You made a confusing subject easy to understand. Thank you!

    • @HackeXPlorer
      @HackeXPlorer  4 ปีที่แล้ว

      Thankyou for the feedback Joseph 👍

    • @TirthPatel7923
      @TirthPatel7923 3 ปีที่แล้ว

      Hey bro, I have a project to do, analyzing the pcap files.. It would be nice of you if you can help me out. PLEASEEE, like we can do a google meet meeting or zoom or something that you like. PLEASE

  • @barkath005
    @barkath005 ปีที่แล้ว

    Thanks for the easy step by step guidance. Appreciate your efforts. 👍👍👍

  • @_admin_user
    @_admin_user 2 ปีที่แล้ว +1

    very informative video

  • @georgegonduan8464
    @georgegonduan8464 ปีที่แล้ว +1

    Thanks for the help to understanding wireshark

  • @NanthaGopalJ-o6r
    @NanthaGopalJ-o6r ปีที่แล้ว

    Good explanation and new information.

  • @ashutoshrajput988
    @ashutoshrajput988 3 ปีที่แล้ว

    the best video on youtube till now. thanks

  • @dsha31
    @dsha31 ปีที่แล้ว

    Very well done..Will be sharing with my SOC team.

  • @nashimahmed7035
    @nashimahmed7035 4 ปีที่แล้ว +2

    Found something very interesting... really like to see such videos upcoming.. Thanks for sharing !!

    • @HackeXPlorer
      @HackeXPlorer  4 ปีที่แล้ว

      Appreciate your feedback Nashim

  • @njayapavithra1705
    @njayapavithra1705 3 ปีที่แล้ว +1

    Amazing, the author explained it so easy. Thank you

    • @HackeXPlorer
      @HackeXPlorer  3 ปีที่แล้ว

      Thankyou for thr feedback Jaya.

  • @v380riMz
    @v380riMz 2 ปีที่แล้ว

    Thanks alot, that export objects is extremely helpful which I didn't know about!

  • @chirojitsarkar
    @chirojitsarkar 3 ปีที่แล้ว

    Fantastic Explanation. It is really helpful for WIRESHARK Beginners.

    • @HackeXPlorer
      @HackeXPlorer  3 ปีที่แล้ว +1

      Glad it was helpful! Thank you Chirojit.

  • @vengalachandu4080
    @vengalachandu4080 2 ปีที่แล้ว

    Excellent # keep doing 👏 👍

  • @johnjohn7549
    @johnjohn7549 3 ปีที่แล้ว +1

    Very interesting and presented in a clear manner. Was a little fast a points, but can hopefully learn those bits later.

  • @lokeshavm8366
    @lokeshavm8366 ปีที่แล้ว

    Great explanation, Please keep posting more videos.

  • @fudbalskafilozofija2818
    @fudbalskafilozofija2818 2 ปีที่แล้ว

    TNice tutorials tutorial is so good, tysm

  • @ReligionAndMaterialismDebunked
    @ReligionAndMaterialismDebunked ปีที่แล้ว

    Thanks, fellow ethical hacker!

  • @nilanjenator
    @nilanjenator 3 ปีที่แล้ว

    Echoing other comments - nice, well made video. Good focus on teaching, rather than video production. At the same time, very practical information.

    • @HackeXPlorer
      @HackeXPlorer  3 ปีที่แล้ว +1

      Thank you for the feedback Nilanjan. Appreciate it a lot.

  • @Martin-ot7xj
    @Martin-ot7xj ปีที่แล้ว

    Hi there, it was a very very useful & informative tutorial video. please upload more about Wireshark. thnx

  • @muruga403
    @muruga403 5 ปีที่แล้ว +4

    Thank you very much for sharing your knowledge, it's very useful
    Milles merci

    • @HackeXPlorer
      @HackeXPlorer  5 ปีที่แล้ว

      it's a pleasure Muvi. De rien

  • @devislight
    @devislight 3 ปีที่แล้ว

    Brilliant, clear and great clarity in the delivery. Thank you so much. 👍👏

  • @immunesicness3399
    @immunesicness3399 2 ปีที่แล้ว

    Finaly some info to work with

  • @sonujalwal4768
    @sonujalwal4768 2 ปีที่แล้ว

    very informative video thanks

  • @leestaton1697
    @leestaton1697 3 ปีที่แล้ว

    good channel I like how you go in depth regarding wireshark Ive got wireshark

    • @HackeXPlorer
      @HackeXPlorer  3 ปีที่แล้ว +1

      Thankyou Lee, appreciate the valuable feedback.

  • @muratafsar9753
    @muratafsar9753 4 ปีที่แล้ว +3

    This is amazing work. Thank you sir. Subscribed !

    • @HackeXPlorer
      @HackeXPlorer  4 ปีที่แล้ว

      Thank you for the feedback ,Murat

  • @PADARIAD
    @PADARIAD 3 ปีที่แล้ว

    No bu****It, right to the point! Love it! you are awesome!

    • @HackeXPlorer
      @HackeXPlorer  3 ปีที่แล้ว

      Thankyou for the valuable feedback Darpan.

  • @ravindra.waghmare
    @ravindra.waghmare 4 ปีที่แล้ว +1

    Wonderful...very nicely explained.!!

  • @fritzbiederstadt4869
    @fritzbiederstadt4869 2 ปีที่แล้ว

    Outstanding video about using Wireshark for security related purposes. I've been doing protocol analysis for a long time with various protocol analyzers, Wireshark is my hands-down favorite. However I've only used it for TCP and application performance analysis and troubleshooting. Although I've had thoughts about getting into the security side of things since, there has been some hesitation. My experience with performance analysis is advanced with computer communication protocols, service layers, etc. Learned a lot - I believe I will download and work through some of this. I'm already using most of the same methodology on the performance analysis side, so it should easy to transfer over my skills. Thanks!

    • @HackeXPlorer
      @HackeXPlorer  2 ปีที่แล้ว

      Thankyou for you feedback Fritz, these keep me motivated to make more videos like this

  • @Jackie_Labrador
    @Jackie_Labrador 2 ปีที่แล้ว +1

    Excellent video :) Thanks

  • @yelinsoe3428
    @yelinsoe3428 2 ปีที่แล้ว

    Prefect informations!

  • @josed4540
    @josed4540 4 ปีที่แล้ว +1

    This was very helpful please make more packet analysis videos, maybe other attacks like XSS, beaconing activity and Trojans. Thank you.

    • @HackeXPlorer
      @HackeXPlorer  4 ปีที่แล้ว

      Thank you Tony, valuable suggestions. I'll add these topics to my future work.

  • @Leokhawarizmi
    @Leokhawarizmi 3 ปีที่แล้ว

    I have learned so much today just in one video, thank you so much please keep going

    • @HackeXPlorer
      @HackeXPlorer  3 ปีที่แล้ว +1

      Glad this was helpful, thankyou Leo.

  • @trendyniro
    @trendyniro 2 ปีที่แล้ว

    very practical, was able to understand easily. Kudos!

  • @channel98-jcrx-tv58
    @channel98-jcrx-tv58 3 ปีที่แล้ว +1

    Thank you man!

  • @acostamanuel2011
    @acostamanuel2011 4 ปีที่แล้ว

    Great step by step video. Exactly what i was looking for!!

  • @tanaysamanta4730
    @tanaysamanta4730 2 ปีที่แล้ว

    Really man! This video was amazing! Thank you!

  • @yadvindersingh4656
    @yadvindersingh4656 3 ปีที่แล้ว

    The flow was great. Thanks for sharing

  • @bolimov
    @bolimov 2 ปีที่แล้ว

    amazing video. simply explained. thanks for the content.

    • @HackeXPlorer
      @HackeXPlorer  2 ปีที่แล้ว +1

      Thank you for your feedback, appreciate it

  • @gwcloete1072
    @gwcloete1072 2 ปีที่แล้ว +1

    wow this is a great video, make more videos, or a udemy course 👏👏👏👏👏

  • @ms7414
    @ms7414 ปีที่แล้ว

    Very useful and well done video. I only wish you had expounded more on the other suspicious server little more in depth. Thanks.

  • @dilainsholidaytrips5641
    @dilainsholidaytrips5641 3 หลายเดือนก่อน

    Good one. Thanks

  • @Kinoti9
    @Kinoti9 3 ปีที่แล้ว

    Wow that was really really smooth. Thanks. Subbed already

  • @SandyLaVogue
    @SandyLaVogue ปีที่แล้ว

    great content!

  • @omomeneehinome
    @omomeneehinome 2 ปีที่แล้ว

    awesome. thank you

  • @youssefelankoud6497
    @youssefelankoud6497 5 ปีที่แล้ว +1

    Thank you so much, this video it's very useful, keep sharing your knowledge

    • @HackeXPlorer
      @HackeXPlorer  5 ปีที่แล้ว +1

      You are welcome, and thankyou for the feedback. Appreciate it.

  • @lawrencestowe7070
    @lawrencestowe7070 4 ปีที่แล้ว

    Really good video, great advice with columns etc

  • @pchebbi
    @pchebbi 4 ปีที่แล้ว

    Nice explanation with good demo. Thank you!

    • @HackeXPlorer
      @HackeXPlorer  4 ปีที่แล้ว

      You are welcome Prasanna

  • @showvik012
    @showvik012 4 ปีที่แล้ว

    Keep them videos coming. Good work!

  • @lastofdev777
    @lastofdev777 3 ปีที่แล้ว

    Thank you man, I really need it for my assigment.

    • @HackeXPlorer
      @HackeXPlorer  3 ปีที่แล้ว

      Glad this helped you, thanx for the feedback

  • @captainnemonic
    @captainnemonic 3 ปีที่แล้ว

    Great presentation and information. Thanks!

  • @riyazshaikh6373
    @riyazshaikh6373 4 ปีที่แล้ว

    Amazing stuff. presented in a very easy manner to understand.

    • @HackeXPlorer
      @HackeXPlorer  4 ปีที่แล้ว

      Glad you liked it! Riyaz

  • @shivendrapratapsingh263
    @shivendrapratapsingh263 2 ปีที่แล้ว

    amazing tutorial

  • @meeraramanujam3665
    @meeraramanujam3665 ปีที่แล้ว

    Thank you🙏🏼

  • @awaisshakir1
    @awaisshakir1 5 ปีที่แล้ว

    Your work is exceptional 👍 please make more videos soon

    • @HackeXPlorer
      @HackeXPlorer  5 ปีที่แล้ว +1

      hey Shakir, thanks for the feedback. yah hope to do more soon. stay tuned

  • @ImranShaikh-kt7ey
    @ImranShaikh-kt7ey 3 ปีที่แล้ว

    Amazing episode 🔥🔥🔥

  • @artember1200
    @artember1200 4 ปีที่แล้ว

    Great work,very informative and professional

    • @HackeXPlorer
      @HackeXPlorer  4 ปีที่แล้ว

      Thankyou for the feedback Artem.

  • @gamehype3207
    @gamehype3207 ปีที่แล้ว

    THANK YOU SO MUCH

  • @kranthikumari7703
    @kranthikumari7703 3 ปีที่แล้ว +1

    Best informative video ever. Keep posting more. This video really helped me understanding analysis. I gave practical try with all the available data. One thing where I lost and now worried is , sample Java extension which downloaded from PCAP data is disappearing after 5 to 10 secs. Can you please help or say why it disappears

    • @HackeXPlorer
      @HackeXPlorer  3 ปีที่แล้ว +1

      Hi Kranthi, nice hear this helped you. The reason the file is disappear is because the antivirus is deleting the file. Would recommend you do this in Virtual windows box with AV disabled.

    • @kranthikumari7703
      @kranthikumari7703 3 ปีที่แล้ว

      ​@@HackeXPlorer your reply did really helped, thanks for your response. i got one more doubt. i used hashmyfiles on windows but for ubuntu i didn't find any application for checking the hash of a file. since i tried this on ubuntu on my VM. so on Linux, there are command-based hash findings but my worry is if I use command-based
      1) will those malicious files get accessed and will my ubuntu machine gets infected.
      2) is there any app like filemyhash like on windows for ubuntu too. Really appreciate for your time and response.

    • @HackeXPlorer
      @HackeXPlorer  3 ปีที่แล้ว +2

      Hi Again, linux is the best way to saflly analyse a windows malware
      1) no using the command line options wont execute the malware.
      Ex sha1sum {filename} md5sum {filename} are some of thr commandline options u can use
      2)no need of a additional application in linux to check the hass values, we used hashmyfiles in windows as there was no built in command link tool ik windows at the time, but now you can use PowerShell commands instead of the above application.
      Use Get-FileHash command.
      docs.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/get-filehash?view=powershell-7.1

    • @kranthikumari7703
      @kranthikumari7703 3 ปีที่แล้ว +1

      @@HackeXPlorer Thanks for clarifying. Already love step by step explanation. Now repect for timely response and clarifying. please keep sharing knowledge. Thankyou.

  • @dhanukawickramasinghe9290
    @dhanukawickramasinghe9290 3 ปีที่แล้ว

    thank you man. it was really helpful

  • @orca2162
    @orca2162 3 ปีที่แล้ว

    Great explanation - thank you

    • @HackeXPlorer
      @HackeXPlorer  3 ปีที่แล้ว

      Many thanks for the feedback Orca.

  • @saby826
    @saby826 3 ปีที่แล้ว

    Very well explained.

  • @pnn0656
    @pnn0656 3 ปีที่แล้ว

    Thanks for such a nice video, you have explained very well and thisbis very very helpful for me

    • @HackeXPlorer
      @HackeXPlorer  3 ปีที่แล้ว

      You are welcome, thanks for the feedback

  • @Brunochavesj
    @Brunochavesj 3 ปีที่แล้ว

    Nice

  • @mohdfirdaus5237
    @mohdfirdaus5237 4 ปีที่แล้ว

    Thanks man. Great Explanation.

    • @HackeXPlorer
      @HackeXPlorer  4 ปีที่แล้ว

      Glad it was helpful! Mohd (y)

  • @Foxx999
    @Foxx999 3 ปีที่แล้ว +10

    Excellent presentation, I actually used this for a guide and was able to make a lot more sense of what I was seeing, Thanks a mil!

    • @HackeXPlorer
      @HackeXPlorer  3 ปีที่แล้ว

      Thank you for the feedback fox, highly appreciate it

  • @mohamadsalhani
    @mohamadsalhani 6 หลายเดือนก่อน +1

    Thanks a lot for your efforts. Could you please send again the link of the traffic sample? The one in the description was not opened. I think you used the version 2014 (MTA-2014-files-contains-malware.zip), then the pw should be infected_2014, it also was not worked. Thanks in advance.

  • @tugrulserhat
    @tugrulserhat 2 ปีที่แล้ว

    very nicely done video. thanks a lot

  • @prasanthkumar6808
    @prasanthkumar6808 2 ปีที่แล้ว +1

    Sir, We are missing your videos now a days... We urge you to do some

    • @HackeXPlorer
      @HackeXPlorer  2 ปีที่แล้ว +2

      Some ideas are in-progress, will release soon

    • @prasanthkumar6808
      @prasanthkumar6808 2 ปีที่แล้ว +1

      @@HackeXPlorer Do more videos on jAR files de-obfuscation techniques sir

  • @kashifumer9283
    @kashifumer9283 2 ปีที่แล้ว

    I feel you

  • @abhishekrajput9434
    @abhishekrajput9434 4 ปีที่แล้ว

    Thanxs.

  • @iMPRE7ed
    @iMPRE7ed 9 หลายเดือนก่อน

    Okay... even if captured locally, you should capture SSL keys to see over TLS

  • @humanrelations3664
    @humanrelations3664 3 ปีที่แล้ว

    Thanks for the video !!!

    • @HackeXPlorer
      @HackeXPlorer  3 ปีที่แล้ว

      Thanks appreciate it ☺️

  • @amirghost281
    @amirghost281 3 ปีที่แล้ว

    Thanks bro , you saved me 👍

  • @ShartedDownMyLeg
    @ShartedDownMyLeg 3 ปีที่แล้ว +2

    Great video, worth a sub.

  • @GiggleYohoo
    @GiggleYohoo 4 ปีที่แล้ว +1

    This is good. Btw, how to block incoming IP to your network using wireshark? Also, is it possible to change IP from IPV6 to IPV4 in wireshark? Thanks

    • @HackeXPlorer
      @HackeXPlorer  4 ปีที่แล้ว +1

      Hi wireshark can only be used to.analyse traffic. None of the mentioned is possible with this tool.

  • @christiancortes5467
    @christiancortes5467 2 ปีที่แล้ว +1

    Hello I've noticed something strange when you said the Source Address that can be found in IPv4 = The infected machine, but doesn't the Source Address mean where the packet is coming from i.e., the infected website? And the destination is where it's sending it to i.e., infected machine. So, does that mean you have the two values of infected machine and infected website mixed up? Tia.

    • @HackeXPlorer
      @HackeXPlorer  2 ปีที่แล้ว +2

      Hi , here the source IP means the infected host (172.16.*.*), which requested the data from destination (37.200.*.*) . hope you got it

    • @christiancortes5467
      @christiancortes5467 2 ปีที่แล้ว +1

      @@HackeXPlorer tysm for the reply, by infected host do you mean the machine and destination is where it got it from? Could I know how to get the end time of a packet? Ty again your vids really help :)

    • @HackeXPlorer
      @HackeXPlorer  2 ปีที่แล้ว +2

      @@christiancortes5467 Think like this, the computer that download malware is the source, since it initiated the traffic. It's downloaded from the destination which is the web site.
      For packet end time i would use the next pack start time in the conversation.

    • @christiancortes5467
      @christiancortes5467 2 ปีที่แล้ว +1

      @@HackeXPlorer thanks!!

  • @dsha31
    @dsha31 ปีที่แล้ว

    👌

  • @adityapaithon6499
    @adityapaithon6499 5 ปีที่แล้ว +1

    great job!

  • @ashanlahiru8020
    @ashanlahiru8020 3 ปีที่แล้ว +1

    Hi! While doing this practical, I need to save these 3 malware files to my pc. I'm not doing the practical in a virtual machine. So will it harm my pc if i save those 3 files to my pc?
    please respond cuz it means a lot to me since I'm doing this for a uni assignment 🥺

    • @HackeXPlorer
      @HackeXPlorer  3 ปีที่แล้ว +1

      Simply Save them in a password protected zip file. The malware will not able to run in this condition, also this will prevent you from accidentally opening them

    • @ashanlahiru8020
      @ashanlahiru8020 3 ปีที่แล้ว +1

      @@HackeXPlorer Ok Bro Thank you..

  • @tanzeelhassan2934
    @tanzeelhassan2934 5 ปีที่แล้ว

    awesome. thanks so much!

    • @HackeXPlorer
      @HackeXPlorer  5 ปีที่แล้ว +1

      Hey, Tanzeel you are welcome.