FIVE COMMON MISTAKES when using Wireshark

แชร์
ฝัง
  • เผยแพร่เมื่อ 26 ก.ย. 2024
  • Packet analysis is hard enough. Avoid these common mistakes that make it even harder. I know... because I have made every single one of them! Comment below with mistakes you have made and how you overcame them - c'mon, be honest! :-)
    If you liked this video, I’d really appreciate you giving me a like and subscribing, it helps me a whole lot. Also don't be shy, chat it up in the comments!
    What network tap is in my backpack? Here is one that won't break the bank!
    amzn.to/3qdCfrn
    == More On-Demand Training from Chris ==
    ▶Getting Started with Wireshark - bit.ly/udemywi...
    ▶Getting Started with Nmap - bit.ly/udemynmap
    == Live Wireshark Training ==
    ▶TCP/IP Deep Dive Analysis with Wireshark - bit.ly/virtual...
    == Private Wireshark Training ==
    Let's get in touch - packetpioneer....
    For professional inquiries please contact me at packetpioneer@gmail.com
    Links above contain affiliate links where I will receive a small amount for any goods purchased. I thank you for clicking because it really helps to support me!! Thank you!!

ความคิดเห็น • 75

  • @dwaynesudduth1028
    @dwaynesudduth1028 2 ปีที่แล้ว +11

    I thought it was hard the few times I've used it--but watching you, I'm finding that it really isn't as hard as I thought.. Thanks for another great video!!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +2

      Awesome Dwayne! Just wanted to share some of my blunders.

    • @dwaynesudduth1028
      @dwaynesudduth1028 2 ปีที่แล้ว +1

      @@ChrisGreer Sharing our blunders makes IT (pun intended) easier for the next person. :)

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      @@dwaynesudduth1028 Nice! Well placed pun. 👏

    • @jazzman2325
      @jazzman2325 ปีที่แล้ว

      he just has a gift. every single word being said matters

  • @hnasr
    @hnasr 2 ปีที่แล้ว +4

    Learned something new, Thanks Chris! Can you talk more about how to setup capture mid network with a tap device so you don’t experience those large segments when capturing at the end point?

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +2

      Hey Hussein! You bet - absolutely a good topic. I'll get that one shot and posted too. Thanks for the comment!

    • @ldsudduthhanover
      @ldsudduthhanover 2 ปีที่แล้ว

      @@ChrisGreer Do you prefer active or passive taps (like the Throwing Star Lan Tap from Hak5)? or do they both have their place? I've only ever used Wireshark on a mirrored switch port, the few times I've used it--or the captures I've looked at have been captured that way.

    • @ldsudduthhanover
      @ldsudduthhanover 2 ปีที่แล้ว

      @@ChrisGreer Do you prefer active or passive taps (like the Throwing Star Lan Tap from Hak5)? or do they both have their place? I've only ever used Wireshark on a mirrored switch port, the few times I've used it--or the captures I've looked at have been captured that way.

  • @TheRonTait
    @TheRonTait 2 ปีที่แล้ว +1

    Work with wireshark on the daily and this video made me smile. Have seen these all so many times.

  • @mytechnotalent
    @mytechnotalent 2 ปีที่แล้ว +2

    Thank you as always Chris for the best Wireshark Instructor in the world! Most comprehensive.

  • @banana_junior_9000
    @banana_junior_9000 ปีที่แล้ว

    So cool. I understood slightly more than half of this lesson.

  • @ksadler97
    @ksadler97 2 ปีที่แล้ว

    Still loving it Chris. I’m not using Wireshark nearly as much as I was in Networking. I still tell people to slap Wireshark on an issue and look at it. So, thanks for doing what you do because I send folks right here to your channel to learn.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Thanks for the mention Kennyon!

  • @ruhsata
    @ruhsata 2 ปีที่แล้ว +1

    You are amazing! Your content on TH-cam and Pluralsight is awesome. Thank you

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Wow, thank you! I appreciate the feedback and thanks for the kind comment.

  • @hashkeeper
    @hashkeeper 2 ปีที่แล้ว

    hey this is a seriously important learning resource, thank you

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Thanks for the comment!!

  • @pafooo1043
    @pafooo1043 2 ปีที่แล้ว

    thank you Chris !:) you’re making it clear, have a nice day

  • @luckygolakoti3241
    @luckygolakoti3241 2 ปีที่แล้ว

    your teaching way is far better than others..thank you for providing good knowledge ...also can you please tell how one can see the data in the payload?

  • @tranxn7971
    @tranxn7971 2 ปีที่แล้ว

    Thank you so much for all the content you are posting on this channel !

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Thanks for the comment!

  • @waynesrealworld5801
    @waynesrealworld5801 2 ปีที่แล้ว

    Wow Chris this is very helpful stuff. Thank-you for sharing all this

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Glad it was helpful!

  • @matthewbrice737
    @matthewbrice737 2 ปีที่แล้ว

    Often times when capturing on a client I’ll also run a procmon trace of network traffic to make it easier to figure out which process is associated with which conversations. That easy correlation is a big reason I was starting to use Message Analyzer and why disappointed it got discontinued.

  • @alaahaider
    @alaahaider 2 ปีที่แล้ว

    As always, awesome video. Thank you Chris

  • @ohasis8331
    @ohasis8331 2 ปีที่แล้ว

    You break it down to the simplistic, thanks.

  • @jonathancastro247
    @jonathancastro247 2 ปีที่แล้ว

    Great video! More "false-alarm" tips when troubleshooting please!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      I’ll keep it up!

  • @johnvardy9559
    @johnvardy9559 ปีที่แล้ว

    Hi Chris, how we understood all of these Tools and how something has to look like.How becomes somebody professional?

  • @wintersol9921
    @wintersol9921 2 ปีที่แล้ว

    Hey, I love your videos. You explain very clearly and you explain it really well. Thank you.

  • @vyasG
    @vyasG 2 ปีที่แล้ว

    Excellent tips. Thank you for sharing.

  • @franckalcidi599
    @franckalcidi599 2 ปีที่แล้ว

    Great tips Chris! Thank you for sharing.

  • @TheKhirocks
    @TheKhirocks 2 ปีที่แล้ว

    Sometimes issues are so intermittent that they can take days to reoccur and not be so bad that end users will notice. In this instance ring buffers are perfect but in addition, using a script to monitor a log file for a specific string which would occur after the event, upon which stops the capture is great for preventing overwriting of capture files.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      I like it, great idea with the scripting.

  • @RickDean
    @RickDean ปีที่แล้ว

    Being hit with a payload around 12-1pm daily. Captured it several times. Anyway, to figure out what the payload was designed to do?

  • @kailashyadav6306
    @kailashyadav6306 2 ปีที่แล้ว

    You are awesome bro..each of your video is like a gold🥇👏

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Thank you so much 😀

  • @fowfo
    @fowfo 2 ปีที่แล้ว

    Chris Greer's content is full of gems.

  • @EschinTenebrous
    @EschinTenebrous 2 ปีที่แล้ว

    Great video!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Glad you enjoyed it!

  • @Zimbo877111
    @Zimbo877111 2 ปีที่แล้ว +2

    You mentioned taps, what model would you recommend ?

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Hey James! I would recommend the Dualcomm Tap - amzn.to/3qdCfrn (Affiliate Link Alert!) But it's the best, cheapest, good-ole tap I know of that I can toss in my backpack. For heavier lifting - check out www.profitap.com. They have AWESOME stuff for tapping as well as hardware-based packet capture. And they are just cool people too.

  • @FayOnis
    @FayOnis 2 ปีที่แล้ว

    useful as usual

  • @brianmurray8943
    @brianmurray8943 2 ปีที่แล้ว

    Thank you for another great video.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Thanks for watching!

  • @Randomvideoanything
    @Randomvideoanything ปีที่แล้ว

    hello, I want to ask, when a mitm occurs, there are 3 incidents, where there is normal data, attack data and combined data between normal data and combined data, my question is how to find out the normal data.

  • @leandrotami
    @leandrotami 2 ปีที่แล้ว

    I would like to know how to define my own custom protocols and have Wireshark automatically parse them neatly in separate fields. I've attempted it many times but I just don't get it.

  • @RyanMurrayTech
    @RyanMurrayTech 2 ปีที่แล้ว

    Really good video! Thank you for the advice! I've ran into all of these at one point! I'm interested to know why you didn't mention Embedded Packet Capture on a switch? 5:35

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Hey Ryan! Honestly I just don't use embedded packet capture as often as I do SPANs and TAPs. For sure it is another method though. Since it gives the switch more work to do in an already "slow" or "problem" environment, I would probably only recommend it as a last option if the others are not available.

  • @homayounshokri5041
    @homayounshokri5041 2 ปีที่แล้ว

    i think most important one is using capture filters
    it will eliminate unrelated traffic

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Yes! They can really help. As long as you know exactly what you are filtering for.

  • @punggukbulan8674
    @punggukbulan8674 2 ปีที่แล้ว +1

    Hi Chris, do you have video deep analysis about UDP ? i see most of video deep analysis is related with TCP in your channel. I would like to learn how to analyze 'Voice Call over Whatsapp' to investigate voice quality...thanks in advance...

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +2

      It's on my punch list for sure! Thanks for the comment.

    • @punggukbulan8674
      @punggukbulan8674 2 ปีที่แล้ว

      @@ChrisGreer great..i will be waiting for that :)

  • @goby_
    @goby_ 2 ปีที่แล้ว

    Hey I'm connected to the network but I only get information on my device I get no traffic from my phone that is connected to the same wifi pls help me

  • @randallhooper4451
    @randallhooper4451 ปีที่แล้ว

    Very nicely done!
    What does MPLS traffic/tagging look like in wireshark?

  • @johnvardy9559
    @johnvardy9559 ปีที่แล้ว

    i cant understand what exactly what we are chasing...

  • @darrinlong8038
    @darrinlong8038 ปีที่แล้ว

    i dont trust wireshark now days when i insatelled it a while back and my laptop started acting strange 3 time this has happened

  • @frequinnasty7303
    @frequinnasty7303 2 ปีที่แล้ว

    Stuff they don't teach when studying for the CCNA! 😂

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      I totally understand!

  • @BenesTV
    @BenesTV 2 ปีที่แล้ว

    The video stopped, loading, not working. Infected?

  • @zsahe21
    @zsahe21 ปีที่แล้ว

    !!!!!

  • @satishprajapati6157
    @satishprajapati6157 2 ปีที่แล้ว

    sir!!! can we see the process id created while connecting with http, throught wireshark. let me know if it can be done. and please provide step by step guide to filter process id that are created in wireshark.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Hey! Yes - arg I need to get a video together about that. Thanks for the comment!

  • @TheSony7up
    @TheSony7up 2 ปีที่แล้ว

    Great stuff