This was more informative then my worthless college professor and textbook combined. Not only did I pass my lab because of this video, I also learned a lot. Thank you for sharing with us!!!!!!!!!!
I dont mean to be off topic but does someone know a trick to get back into an Instagram account? I was stupid forgot my password. I love any tips you can give me
First of all, I want to thank you for the logical processes that you've shared here in this video, you have my subscription and like, and please make some playlists about every tool.
Amazing, really clear, you are a great instructor. As I read on a comment below, I learned more from you in 16 min that from textbooks and professor in college
Omg this is the best malware capture vid for Wireshark, Thank you so much for explaining step-by-step. its really helped me in packet analysis and hunting. Thanks mate!!!
Hey bro, I have a project to do, analyzing the pcap files.. It would be nice of you if you can help me out. PLEASEEE, like we can do a google meet meeting or zoom or something that you like. PLEASE
Hey bro, I have a project to do, analyzing the pcap files.. It would be nice of you if you can help me out. PLEASEEE, like we can do a google meet meeting or zoom or something that you like. PLEASE
Outstanding video about using Wireshark for security related purposes. I've been doing protocol analysis for a long time with various protocol analyzers, Wireshark is my hands-down favorite. However I've only used it for TCP and application performance analysis and troubleshooting. Although I've had thoughts about getting into the security side of things since, there has been some hesitation. My experience with performance analysis is advanced with computer communication protocols, service layers, etc. Learned a lot - I believe I will download and work through some of this. I'm already using most of the same methodology on the performance analysis side, so it should easy to transfer over my skills. Thanks!
Best informative video ever. Keep posting more. This video really helped me understanding analysis. I gave practical try with all the available data. One thing where I lost and now worried is , sample Java extension which downloaded from PCAP data is disappearing after 5 to 10 secs. Can you please help or say why it disappears
Hi Kranthi, nice hear this helped you. The reason the file is disappear is because the antivirus is deleting the file. Would recommend you do this in Virtual windows box with AV disabled.
@@HackeXPlorer your reply did really helped, thanks for your response. i got one more doubt. i used hashmyfiles on windows but for ubuntu i didn't find any application for checking the hash of a file. since i tried this on ubuntu on my VM. so on Linux, there are command-based hash findings but my worry is if I use command-based 1) will those malicious files get accessed and will my ubuntu machine gets infected. 2) is there any app like filemyhash like on windows for ubuntu too. Really appreciate for your time and response.
Hi Again, linux is the best way to saflly analyse a windows malware 1) no using the command line options wont execute the malware. Ex sha1sum {filename} md5sum {filename} are some of thr commandline options u can use 2)no need of a additional application in linux to check the hass values, we used hashmyfiles in windows as there was no built in command link tool ik windows at the time, but now you can use PowerShell commands instead of the above application. Use Get-FileHash command. docs.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/get-filehash?view=powershell-7.1
@@HackeXPlorer Thanks for clarifying. Already love step by step explanation. Now repect for timely response and clarifying. please keep sharing knowledge. Thankyou.
Thanks a lot for your efforts. Could you please send again the link of the traffic sample? The one in the description was not opened. I think you used the version 2014 (MTA-2014-files-contains-malware.zip), then the pw should be infected_2014, it also was not worked. Thanks in advance.
Hello I've noticed something strange when you said the Source Address that can be found in IPv4 = The infected machine, but doesn't the Source Address mean where the packet is coming from i.e., the infected website? And the destination is where it's sending it to i.e., infected machine. So, does that mean you have the two values of infected machine and infected website mixed up? Tia.
@@HackeXPlorer tysm for the reply, by infected host do you mean the machine and destination is where it got it from? Could I know how to get the end time of a packet? Ty again your vids really help :)
@@christiancortes5467 Think like this, the computer that download malware is the source, since it initiated the traffic. It's downloaded from the destination which is the web site. For packet end time i would use the next pack start time in the conversation.
Hi! While doing this practical, I need to save these 3 malware files to my pc. I'm not doing the practical in a virtual machine. So will it harm my pc if i save those 3 files to my pc? please respond cuz it means a lot to me since I'm doing this for a uni assignment 🥺
Simply Save them in a password protected zip file. The malware will not able to run in this condition, also this will prevent you from accidentally opening them
This was more informative then my worthless college professor and textbook combined. Not only did I pass my lab because of this video, I also learned a lot. Thank you for sharing with us!!!!!!!!!!
I'm just 5mins into this and it's sooo helpful.Totally assisted in better understanding of wireshark. Thank you .
NOT ALL HEROES WEAR CAPES!!!
This was presented and broken down very well. Thank you ! Subscribed
Thank you for your feedback, appreciate it.
Hey bro, I have a project to do on Wireshark, I have to analyze the files, can you please help me out please, like we can meet on zoom
that was the best explaination i´ve ever seen on youtube. bravo! you should bring more content out about wireshark and live examples. great!
This the most informative, hands on video I've watched on this tube about this subject...Just amazing man. Thank you very much.
Thank you for the valuable feedback :)
I dont mean to be off topic but does someone know a trick to get back into an Instagram account?
I was stupid forgot my password. I love any tips you can give me
First of all, I want to thank you for the logical processes that you've shared here in this video, you have my subscription and like, and please make some playlists about every tool.
Thankyou very much abdou 👍
this is the best wireshark tutorial
Dang, this is super informative. It's 2021, and this video is still ultra useful. Thank you!
The source material i referred to was even older. But still this is the fundamentals 😁. But builds a strong foundation
life saver really was so lost with an assignment due tmr and chanced upon this video thanku sm !!
Amazing, really clear, you are a great instructor. As I read on a comment below, I learned more from you in 16 min that from textbooks and professor in college
Thank you for the feedback Tomas
Absolutely Brilliant EXplanantion
Thankyou very much
Careful! He's a hero!!! Subscribed !!!
Excellent. You made it so clear.
Thank you Konul
Very informative and very good explanation. Thank you.
Thankyou Shafrina 👍👍
Thanks, alot!!! for uploading this informative video, I really learned a lot about Wireshark ethereal
Thanks for the feedback Rashmi 👍
I've learned quite a bit knowledge on his analysis. I'm surprise this channel haven't blew up yet. Subscribed for more!! lets go!
Thanks for the feedback
I had been looking for this type of worth content and in this video you covered a lot. Thanks for a worthy video.
WOW!! Crazy level of detail and new-user friendly. Thank you very much for uploading.
You're very welcome! Hilko 👍
Excellent .. just excellent !!!!! Thanks for this!!
Omg this is the best malware capture vid for Wireshark, Thank you so much for explaining step-by-step. its really helped me in packet analysis and hunting. Thanks mate!!!
You are welcome Ruth, thank-you for the feedback.
You rock man, I needed it to do my university exercise. Thank you so much :)
Hey bro, I have a project to do, analyzing the pcap files.. It would be nice of you if you can help me out. PLEASEEE, like we can do a google meet meeting or zoom or something that you like. PLEASE
Hey bro, I want a help from both of you For my Uni Assignmnt.. Please Can You??
Very well explained and demonstrated. You made a confusing subject easy to understand. Thank you!
Thankyou for the feedback Joseph 👍
Hey bro, I have a project to do, analyzing the pcap files.. It would be nice of you if you can help me out. PLEASEEE, like we can do a google meet meeting or zoom or something that you like. PLEASE
Thanks for the easy step by step guidance. Appreciate your efforts. 👍👍👍
very informative video
Thanks for the help to understanding wireshark
Good explanation and new information.
the best video on youtube till now. thanks
Glad it helped
Very well done..Will be sharing with my SOC team.
Found something very interesting... really like to see such videos upcoming.. Thanks for sharing !!
Appreciate your feedback Nashim
Amazing, the author explained it so easy. Thank you
Thankyou for thr feedback Jaya.
Thanks alot, that export objects is extremely helpful which I didn't know about!
Fantastic Explanation. It is really helpful for WIRESHARK Beginners.
Glad it was helpful! Thank you Chirojit.
Excellent # keep doing 👏 👍
Very interesting and presented in a clear manner. Was a little fast a points, but can hopefully learn those bits later.
Great explanation, Please keep posting more videos.
TNice tutorials tutorial is so good, tysm
Thanks, fellow ethical hacker!
Echoing other comments - nice, well made video. Good focus on teaching, rather than video production. At the same time, very practical information.
Thank you for the feedback Nilanjan. Appreciate it a lot.
Hi there, it was a very very useful & informative tutorial video. please upload more about Wireshark. thnx
Thank you very much for sharing your knowledge, it's very useful
Milles merci
it's a pleasure Muvi. De rien
Brilliant, clear and great clarity in the delivery. Thank you so much. 👍👏
Finaly some info to work with
very informative video thanks
good channel I like how you go in depth regarding wireshark Ive got wireshark
Thankyou Lee, appreciate the valuable feedback.
This is amazing work. Thank you sir. Subscribed !
Thank you for the feedback ,Murat
No bu****It, right to the point! Love it! you are awesome!
Thankyou for the valuable feedback Darpan.
Wonderful...very nicely explained.!!
Thanks a lot 😊
Outstanding video about using Wireshark for security related purposes. I've been doing protocol analysis for a long time with various protocol analyzers, Wireshark is my hands-down favorite. However I've only used it for TCP and application performance analysis and troubleshooting. Although I've had thoughts about getting into the security side of things since, there has been some hesitation. My experience with performance analysis is advanced with computer communication protocols, service layers, etc. Learned a lot - I believe I will download and work through some of this. I'm already using most of the same methodology on the performance analysis side, so it should easy to transfer over my skills. Thanks!
Thankyou for you feedback Fritz, these keep me motivated to make more videos like this
Excellent video :) Thanks
Prefect informations!
Thank you very much
This was very helpful please make more packet analysis videos, maybe other attacks like XSS, beaconing activity and Trojans. Thank you.
Thank you Tony, valuable suggestions. I'll add these topics to my future work.
I have learned so much today just in one video, thank you so much please keep going
Glad this was helpful, thankyou Leo.
very practical, was able to understand easily. Kudos!
Thank you man!
Happy to help!
Great step by step video. Exactly what i was looking for!!
Really man! This video was amazing! Thank you!
The flow was great. Thanks for sharing
Glad you enjoyed it!
amazing video. simply explained. thanks for the content.
Thank you for your feedback, appreciate it
wow this is a great video, make more videos, or a udemy course 👏👏👏👏👏
Thank you, I will
Very useful and well done video. I only wish you had expounded more on the other suspicious server little more in depth. Thanks.
Good one. Thanks
Wow that was really really smooth. Thanks. Subbed already
great content!
awesome. thank you
Thank you so much, this video it's very useful, keep sharing your knowledge
You are welcome, and thankyou for the feedback. Appreciate it.
Really good video, great advice with columns etc
Glad it helped!
Nice explanation with good demo. Thank you!
You are welcome Prasanna
Keep them videos coming. Good work!
Thankyou Showvik
Thank you man, I really need it for my assigment.
Glad this helped you, thanx for the feedback
Great presentation and information. Thanks!
Thankyou Larry
Amazing stuff. presented in a very easy manner to understand.
Glad you liked it! Riyaz
amazing tutorial
Thank you🙏🏼
You’re welcome 😊
Your work is exceptional 👍 please make more videos soon
hey Shakir, thanks for the feedback. yah hope to do more soon. stay tuned
Amazing episode 🔥🔥🔥
Great work,very informative and professional
Thankyou for the feedback Artem.
THANK YOU SO MUCH
You're welcome!
Best informative video ever. Keep posting more. This video really helped me understanding analysis. I gave practical try with all the available data. One thing where I lost and now worried is , sample Java extension which downloaded from PCAP data is disappearing after 5 to 10 secs. Can you please help or say why it disappears
Hi Kranthi, nice hear this helped you. The reason the file is disappear is because the antivirus is deleting the file. Would recommend you do this in Virtual windows box with AV disabled.
@@HackeXPlorer your reply did really helped, thanks for your response. i got one more doubt. i used hashmyfiles on windows but for ubuntu i didn't find any application for checking the hash of a file. since i tried this on ubuntu on my VM. so on Linux, there are command-based hash findings but my worry is if I use command-based
1) will those malicious files get accessed and will my ubuntu machine gets infected.
2) is there any app like filemyhash like on windows for ubuntu too. Really appreciate for your time and response.
Hi Again, linux is the best way to saflly analyse a windows malware
1) no using the command line options wont execute the malware.
Ex sha1sum {filename} md5sum {filename} are some of thr commandline options u can use
2)no need of a additional application in linux to check the hass values, we used hashmyfiles in windows as there was no built in command link tool ik windows at the time, but now you can use PowerShell commands instead of the above application.
Use Get-FileHash command.
docs.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/get-filehash?view=powershell-7.1
@@HackeXPlorer Thanks for clarifying. Already love step by step explanation. Now repect for timely response and clarifying. please keep sharing knowledge. Thankyou.
thank you man. it was really helpful
Great explanation - thank you
Many thanks for the feedback Orca.
Very well explained.
Thanks Saby
Thanks for such a nice video, you have explained very well and thisbis very very helpful for me
You are welcome, thanks for the feedback
Nice
Thanks man. Great Explanation.
Glad it was helpful! Mohd (y)
Excellent presentation, I actually used this for a guide and was able to make a lot more sense of what I was seeing, Thanks a mil!
Thank you for the feedback fox, highly appreciate it
Thanks a lot for your efforts. Could you please send again the link of the traffic sample? The one in the description was not opened. I think you used the version 2014 (MTA-2014-files-contains-malware.zip), then the pw should be infected_2014, it also was not worked. Thanks in advance.
very nicely done video. thanks a lot
Sir, We are missing your videos now a days... We urge you to do some
Some ideas are in-progress, will release soon
@@HackeXPlorer Do more videos on jAR files de-obfuscation techniques sir
I feel you
Thanxs.
Okay... even if captured locally, you should capture SSL keys to see over TLS
Thanks for the video !!!
Thanks appreciate it ☺️
Thanks bro , you saved me 👍
Great video, worth a sub.
Thanks for the sub!
This is good. Btw, how to block incoming IP to your network using wireshark? Also, is it possible to change IP from IPV6 to IPV4 in wireshark? Thanks
Hi wireshark can only be used to.analyse traffic. None of the mentioned is possible with this tool.
Hello I've noticed something strange when you said the Source Address that can be found in IPv4 = The infected machine, but doesn't the Source Address mean where the packet is coming from i.e., the infected website? And the destination is where it's sending it to i.e., infected machine. So, does that mean you have the two values of infected machine and infected website mixed up? Tia.
Hi , here the source IP means the infected host (172.16.*.*), which requested the data from destination (37.200.*.*) . hope you got it
@@HackeXPlorer tysm for the reply, by infected host do you mean the machine and destination is where it got it from? Could I know how to get the end time of a packet? Ty again your vids really help :)
@@christiancortes5467 Think like this, the computer that download malware is the source, since it initiated the traffic. It's downloaded from the destination which is the web site.
For packet end time i would use the next pack start time in the conversation.
@@HackeXPlorer thanks!!
👌
great job!
Thank you Adithya.
Hi! While doing this practical, I need to save these 3 malware files to my pc. I'm not doing the practical in a virtual machine. So will it harm my pc if i save those 3 files to my pc?
please respond cuz it means a lot to me since I'm doing this for a uni assignment 🥺
Simply Save them in a password protected zip file. The malware will not able to run in this condition, also this will prevent you from accidentally opening them
@@HackeXPlorer Ok Bro Thank you..
awesome. thanks so much!
Hey, Tanzeel you are welcome.