How IP FRAGMENTATION Works

แชร์
ฝัง
  • เผยแพร่เมื่อ 5 ก.ค. 2024
  • IP Fragmentation is an important feature to understand, especially many scanning tools use it to try to bypass Intrusion Detection Systems. Knowing how it works and how to spot it is important for all engineers and cybersecurity professionals, especially those going for certifications like the CCNA, Net+, CEH, PenTest+ or any other cyber cert.
    ====Download the pcap here ====
    packetpioneer.com/wp-content/...
    == More On-Demand Training from Chris ==
    ▶Getting Started with Wireshark - bit.ly/udemywireshark
    ▶Getting Started with Nmap - bit.ly/udemynmap
    == Live Wireshark Training ==
    ▶TCP/IP Deep Dive Analysis with Wireshark - bit.ly/virtualwireshark
    == Private Wireshark Training ==
    Let's get in touch - packetpioneer.com/product/pri...
    Timestamps:
    0:00 Intro
    1:06 IP Fragments Explained
    1:50 Fragmentation Illustrated
    3:36 Analyzing Oversize Pings
    8:21 The "Do Not Fragment" Bit
    10:05 Using Fragmentation with NMAP
    14:52 IP Fragmentation Overvew
    Hope this helps Packet People! Please like, share, subscribe!
    Shout out to @NetworkChuck for always drinking coffee on his videos. Gave me the inspiration to put it into this one.
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 146

  • @dirkl9652
    @dirkl9652 2 ปีที่แล้ว +11

    Good stuff Chris !!!! Keep them coming and much appreciated. It's good to review the basics from time to time.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Thanks for the comment Dirk! The fundamentals are everything.

    • @techlearner4806
      @techlearner4806 6 หลายเดือนก่อน

      @@ChrisGreer Agreed......

  • @NarendraS
    @NarendraS 2 ปีที่แล้ว +21

    Dude I could literally watch you whole day. Such a calm and smooth explanation

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +3

      Thanks for the comment!

  • @herculesgixxer
    @herculesgixxer 2 ปีที่แล้ว +7

    Chris, you never cease to explain anything with utmost clarity and precision. You inspire to learn more!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Thank you for the kind comment!

  • @THEWolf-bz6ot
    @THEWolf-bz6ot 2 ปีที่แล้ว

    thank you Chris for sharing all these staffs to help network engineers being in the riight direction !

  • @LostBoi803
    @LostBoi803 2 ปีที่แล้ว +4

    The fact that Chris thought "There might be someone who is interested in learning this, so let's make a video" in itself is great. Thank you so much Chris!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Thank you for thinking that! Happy that other people like to learn the same stuff my brain finds interesting. 😄

    • @LostBoi803
      @LostBoi803 2 ปีที่แล้ว

      @@ChrisGreer You probably have a fair idea how many of us resonate with your ideas. Way to go 🥳

  • @ramzal786
    @ramzal786 ปีที่แล้ว

    Good one Chris...kudos for taking the time to record this......Thx much.

    • @ChrisGreer
      @ChrisGreer  ปีที่แล้ว

      Thanks for the comment. It helps!

  • @billybuck2713
    @billybuck2713 ปีที่แล้ว +3

    Super quality video! I learned so much, I love that you show us the packets so we can see whats really going on. Its a great style of learning!

    • @ChrisGreer
      @ChrisGreer  ปีที่แล้ว

      Glad you enjoyed it!

  • @jodypetroni3135
    @jodypetroni3135 22 วันที่ผ่านมา

    this was one of the best explanation videos ever! thanks Chris

  • @rdp8545
    @rdp8545 2 ปีที่แล้ว

    You're a legend Chris for sharing this info. It makes us understand Wireshark so much easier.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Awesome! Glad it helps you RDP.

  • @JoshKuo
    @JoshKuo 2 ปีที่แล้ว

    This is the best IP fragmentation explanation I have seen! Thank you for this excellent video which both my wife and I enjoyed :)

  • @JuberPashaShaik
    @JuberPashaShaik 2 ปีที่แล้ว

    This is awesome. The concept was explained in a very detailed manner and easy to understand. Hope we see more videos from you.

  • @kianooshmehrandish7187
    @kianooshmehrandish7187 4 หลายเดือนก่อน

    why I’m really finding you now? you’ve been here for 2 years and dumb me just found you, anyway you are awesome teacher keep up the great work❤

    • @ChrisGreer
      @ChrisGreer  4 หลายเดือนก่อน

      Thank you! I’ll still be around so check back in from time to time!

  • @mayurhabbu7361
    @mayurhabbu7361 2 ปีที่แล้ว

    Absolutely liked it Chris !! Much needed fundamentals brush up for me

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Awesome Mayur, thank you for the comment!

  • @mustafaabdelfattah2493
    @mustafaabdelfattah2493 ปีที่แล้ว

    Thanks chris , i used to bypass fragmented packets in wireshark during analysis cause i couldnt understand it , you helped too much to change the idea of fragmentation complexity
    Great vidio and explanation , thanks so much , really appaociated

  • @vyasG
    @vyasG 2 ปีที่แล้ว

    Great video. crystal clear explanation. Thank you so much!

  • @MrKyubiSasuke
    @MrKyubiSasuke ปีที่แล้ว

    Taking this class in college rn and the explanations weren’t getting through but this really helps a lot

  • @venkatesh4760
    @venkatesh4760 2 ปีที่แล้ว

    Thanks for the Clearly Explained Video Chirs I am following along with all your videos from Pluralsight.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Great to hear! Awesome!

  • @TenTailedDaemon
    @TenTailedDaemon 2 ปีที่แล้ว

    They way you explain things is super clear. Thank you very much for sharing your knowledge you're amazing.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      You're very welcome! Thank you for watching and commenting.

  • @spoorthipanduranga466
    @spoorthipanduranga466 2 ปีที่แล้ว

    This is awesome, I'd been looking for this answer since last year after I failed in my Interview and I finally got the answer! Thank you very much. Its simple and well explained.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Awesome! Glad it helped you! 👏

  • @zaferseis7842
    @zaferseis7842 3 หลายเดือนก่อน

    Great explanation Chris! Thanks

  • @Manavetri
    @Manavetri 2 ปีที่แล้ว +2

    excellent video. It shows that you have the concepts very well since you can describe them in an extremely simple way so that anyone can understand it... Thanks for the brilliant videos you have.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Thank you for the comment Marcelo!

  • @endrixhafa6407
    @endrixhafa6407 10 หลายเดือนก่อน

    much appreciated, becoming addicted on learning ,great stuff

  • @dimitarchristov2965
    @dimitarchristov2965 2 ปีที่แล้ว

    Great explanation, thanks for showing how looks ok wireshark too, much easier to understand,🙌

  • @Karello1
    @Karello1 ปีที่แล้ว

    The best wireshark guy out there 😊

  • @98854arjun
    @98854arjun 2 ปีที่แล้ว

    Hi Chris. Thanks from India!! Excellent video and very well explained.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Glad it was helpful! Thank you!

  • @THEWolf-bz6ot
    @THEWolf-bz6ot 2 ปีที่แล้ว

    THank you so much for what you share with us !!

  • @manjesh23
    @manjesh23 2 ปีที่แล้ว

    Good videos Chris, its very easy to understand the concepts what you say. Love to see some SSL handshake videos and OCSP too.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Thanks Manjesh! I appreciate the feedback!

  • @sharpestasset9615
    @sharpestasset9615 2 ปีที่แล้ว +4

    My hope is to one day be as good as you. Thank you so much for all the work you put into your vids. Great explanations.👍

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +2

      My hope is that one day you are better... 🙃

  • @MyDiscovery2021
    @MyDiscovery2021 2 ปีที่แล้ว

    Really helpful in my network testing.. Awesome

  • @mcgirishnetwork
    @mcgirishnetwork 2 ปีที่แล้ว

    Waiting for this explanation. Thanks a lot for this wonderful explanation video

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      You are most welcome!

  • @osamaabou-el-gibeen9704
    @osamaabou-el-gibeen9704 2 ปีที่แล้ว

    Excellent Video Mr G!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Thank you kindly

  • @jgvideo5512
    @jgvideo5512 2 ปีที่แล้ว

    Simply explained! Thanks

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Glad it was helpful!

  • @mintoo2cool
    @mintoo2cool 2 หลายเดือนก่อน

    you're a great teacher!

    • @ChrisGreer
      @ChrisGreer  2 หลายเดือนก่อน

      Thank you! 😃

  • @vu2957
    @vu2957 2 ปีที่แล้ว

    Awesome explaination.. I can imagine packet travelling in ma brain..
    Tnx for such great share Mr. Chris🥸

  • @camsasuncion
    @camsasuncion ปีที่แล้ว

    Super awesome explanation!!!!

    • @ChrisGreer
      @ChrisGreer  ปีที่แล้ว

      Glad you think so!

  • @x8x8x8x8
    @x8x8x8x8 2 ปีที่แล้ว

    Good explanation.

  • @haroldw2823
    @haroldw2823 2 ปีที่แล้ว

    Hi Chris, that is great stuff.
    Came here because Im starting out on this journey from scratch after a career in Oil.
    After doing a lab and not knowing anything about wireshark I found your site and clicked on the first video that came up.
    I will go through your wireshark class then head back over to ine and complete the lab.
    I like the way you explain this stuff, seems to resonate with me. Subbed and appreciated cheers mate.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Thanks Harold for the comment! Great to have you on the channel!

  • @camsasuncion
    @camsasuncion ปีที่แล้ว

    You've made me a fan!

    • @ChrisGreer
      @ChrisGreer  ปีที่แล้ว

      Awesome, great to have you on the channel and thank you for the comment!

  • @neadlead2621
    @neadlead2621 ปีที่แล้ว

    thanks again chris the best

  • @nikolaydachev9691
    @nikolaydachev9691 2 ปีที่แล้ว

    Chris, good job, It will be very interesting for a lot lite more advance users if you can make a video about how to detect network shaper from ISP side (our ISP limit us to what they claim or they do something else ... )

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Great suggestion! I will see what I can do.

  • @ahmetkarakartal9563
    @ahmetkarakartal9563 ปีที่แล้ว

    thank you so much

  • @rubo111
    @rubo111 5 หลายเดือนก่อน

    Nice video, always enjoy the content you put out.
    At 2:35, I think you made a mistake here. The 1500 byte packet gets split into a 1400 byte packet and a 120 byte packet (assuming we are talking about L3 inclusive of headers here).

  • @adedejiemmanuel1
    @adedejiemmanuel1 2 ปีที่แล้ว

    This is beautiful. Thanks.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Thanks for the comment!

  • @KaySwiss21
    @KaySwiss21 2 ปีที่แล้ว

    YES, more GREER content!!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      More on the way!

  • @troysipple2591
    @troysipple2591 11 หลายเดือนก่อน

    That was very interesting.

  • @dinieshvc8069
    @dinieshvc8069 2 ปีที่แล้ว

    nice explanation chris, need video related to ECN

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Oooh great idea. I like it.

  • @James_Knott
    @James_Knott 6 หลายเดือนก่อน

    One thing to bear in mind is fragmentation is deprecated, replaced with Path MTU Discovery (PMTUD), where routers are not allowed to fragment and must return a too big ICMP message on oversize packets. This is mandatory on IPv6 and often happens on IPv4 by setting the do not fragment flat.

  • @shawn8163
    @shawn8163 2 ปีที่แล้ว

    Great video!

  • @kevinaltizer
    @kevinaltizer 2 ปีที่แล้ว

    Great info! Thanks!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Glad it was helpful!

  • @abdirahmanabdullahi1150
    @abdirahmanabdullahi1150 2 ปีที่แล้ว

    Chris thank you man

  • @majiddehbi9186
    @majiddehbi9186 2 ปีที่แล้ว

    Great thx Chris

  • @danpacheco1
    @danpacheco1 2 ปีที่แล้ว +3

    Chris is so good, I watch his videos on topics I already know, just to see how he approaches the topic. Nice shout out to network chuck, hopefully Chris doesn’t get all clickbaity like him 🥴

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Great to meet you Daniel, and thank you for the feedback!

  • @james-wihz
    @james-wihz 9 หลายเดือนก่อน

    thank bro!

  • @rajneeshrai1781
    @rajneeshrai1781 2 ปีที่แล้ว

    Marvelous explanation Sir...
    Can we get a video on TCP headers???
    ✌️

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      There are quite a few on the channel already, anything specific you are looking for?

  • @rohscx
    @rohscx 2 ปีที่แล้ว

    nice thanks

  • @rakeshcristobal8320
    @rakeshcristobal8320 ปีที่แล้ว

    Great explanation Chris! But at 5:00, wouldn't you take off 18 bytes instead of 14 for the Ethernet header? Is the 4 byte FCS not counted?

    • @ChrisGreer
      @ChrisGreer  ปีที่แล้ว +1

      GREAT catch! So Wireshark doesn't calculate the FCS as a part of the length. So that is why the frame is 1514 and the remaining part of the Ethernet frame is 14 bytes.

  • @homayounshokri5041
    @homayounshokri5041 2 ปีที่แล้ว

    Hi Chris
    Great video and really practical content that network engineers must should know.
    Can u make video tcpdump?

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Great suggestion!

  • @pcbona
    @pcbona 2 ปีที่แล้ว

    Would love to see a video on path mtu discovery. Never truly understood that functionality...

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Good idea! Great topic that is often misunderstood.

  • @cr7akki
    @cr7akki 11 หลายเดือนก่อน

    Hi sir ,i want to know if UDP support MTU and how can we make change so client and server can see each other Mtu size on UDP ,is there a registry or some change we can do on OS?

  • @user-sc2gg7dn3d
    @user-sc2gg7dn3d 8 หลายเดือนก่อน

    Nice

  • @killerx8902
    @killerx8902 2 ปีที่แล้ว

    Awesome

  • @rabinupadhaya7232
    @rabinupadhaya7232 ปีที่แล้ว

    Who sets the df bit?? Is it the application or the gateway..??

  • @ratnavodutta
    @ratnavodutta 2 ปีที่แล้ว

    Hello Chris,
    What I did not understand why did you mentioned that the MTU size is low then fragmentation happens?
    Opinion - Doesn't the fragmentation occurs only when the MTU size is higher than 1500bytes? That means if the value is somewhere say 2000bytes then the fragmentation occurs.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Hey Ratnavo - fragmentation is only necessary when the MTU is lower than the packet size. If I have an MTU that is larger than 1500, then there is no need to break up a 1500 byte packet, which is the max in most environments. Hope that helps.

  • @tommurphy2332
    @tommurphy2332 ปีที่แล้ว

    I created a display column for time-to-live and it seems that every value in the column is an integer power of 2: 1, 32, 128 and so on. So, I believe this capture file came from the server side of the network and I need to capture the client side or some other node to see a value in time-to-live that's not an integer power of 2.

  • @CrashLoopBackOff-K8s
    @CrashLoopBackOff-K8s 2 ปีที่แล้ว

    Great explanation and content. Leaving this comment for the algorithm, but if you keep putting out this kind of high quality content, you won't need any help from me. Keep up the great work!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Thanks for the comment! I appreciate that you help me out - comments really do help the algorithm which in turn helps me grow the channel.

  • @tariqmehmood3698
    @tariqmehmood3698 2 ปีที่แล้ว

    Thanks for the awesome video. Do you have any plan how can we split big pcap file to small? I have file with thousands of sessions but I need to filter only 2 sessions and send it to third party. Appreciate if you can guide.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Hey Tariq - sure use editcap on the command line. It gets installed with wireshark. If editcap is a part of your path, you can just use this syntax:
      editcap -c 100 big.pcap small pcap
      That will break up the big pcap into a bunch of small pcaps of 100 packets each. You can decide how many packets you want in each one.

    • @tariqmehmood3698
      @tariqmehmood3698 2 ปีที่แล้ว

      @@ChrisGreer is there any way to filter on basis of source port or per session?

  • @abdirahmanabdullahi1150
    @abdirahmanabdullahi1150 2 ปีที่แล้ว

    this man is really legend expert of packet sniffing

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Thanks for the comment!

  • @milogop3574
    @milogop3574 2 ปีที่แล้ว

    So i understand how Fragmentation works, and I understand what Segmentation does, but my question is: If it is common practice to use segmentation to ensure that the eventual frame being transmitted does not exceed the path MTU, then in what scenario would we need fragmentation?

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Yes, that is why we can adjust the MSS on network devices. Let TCP do the chopping instead of the routers. Thanks for the comment!

  • @TarikZakariaBenmerar
    @TarikZakariaBenmerar 2 ปีที่แล้ว

    you could do "sudo !!" to add sudo to the last command

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Good thinking - sometimes I forget!

    • @TarikZakariaBenmerar
      @TarikZakariaBenmerar 2 ปีที่แล้ว

      @@ChrisGreer thank you for the video. A couple of things I will add when talking about fragmentations to my students :D

  • @John-qy9rx
    @John-qy9rx ปีที่แล้ว

    does encryption still work with fragmentation?

    • @ChrisGreer
      @ChrisGreer  ปีที่แล้ว

      Fragmentation happens at a lower layer than encryption with TLS. So it won’t impact the encryption.

  • @oluwatobilobaayofe6303
    @oluwatobilobaayofe6303 2 ปีที่แล้ว

    What if one of the fragments goes missing, how will the ACK mechanism going to deal with it? Thanks.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      IP won’t be able to reassemble it to pass it up the stack to tcp. So tcp will treat it as a lost segment and it will have to retransmit the whole thing.

    • @oluwatobilobaayofe6303
      @oluwatobilobaayofe6303 2 ปีที่แล้ว

      @@ChrisGreer Oh thanks!
      Please more questions if you don't mind.
      Do you know how one can modify the TCP/IP PDU to include some custom fields? I am experimenting with some SDN stuffs on mininet, hopefully you know about it?

    • @oluwatobilobaayofe6303
      @oluwatobilobaayofe6303 2 ปีที่แล้ว

      @@ChrisGreer Also, you talk about re-assembly for fragmented IP packets. Is it the same with packet re-ordering. My current understanding of packet re-ordering is destination re-arranging the packets when they arrive out of sequence probably due to traversing different paths. Am I right on this? Kindly shed lights please. Thanks.

  • @rolandoa.valenzuela2756
    @rolandoa.valenzuela2756 2 ปีที่แล้ว

    The million dollar question: Is fragmentation bad? I mean if I need a 2mb pdf or a 10gb game it would still need to be sliced, right? Would you consider fragmentation as a network problem? Would fragmentation slow down an application?
    Thanks.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Fragmentation isn't ideal. It takes more process for the router to break it up, then the receiver to reassemble it. There would probably have to be a significant amount of fragmentation to impact performance - but the real problem is the packets that cannot be fragmented. Those will need to be retransmitted. That is what will KILL performance.

    • @rolandoa.valenzuela2756
      @rolandoa.valenzuela2756 2 ปีที่แล้ว

      Understood @@ChrisGreer thanks for the explanation. Not too long ago a customer had problems over a VPN, the RTT was always fine, I noticed some fragmentation but it was still pretty fast and it didn't explain the app hanging for 90secs. I asked the server team to review but I never got a response back and it still bothers me hahahaha

  • @user-uj4mv9vd5w
    @user-uj4mv9vd5w ปีที่แล้ว

    why ICMP length is 162bytes

  • @villurisatya5132
    @villurisatya5132 2 ปีที่แล้ว

    Can we avoid fragmentation by adjusting mss value ?

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Yes, that is one way to do it. I'd probably do that as a last step though.

    • @villurisatya5132
      @villurisatya5132 2 ปีที่แล้ว

      @@ChrisGreer thanks for replying... One more question... Is MSS can be changed manually or it adjust automatically

    • @villurisatya5132
      @villurisatya5132 2 ปีที่แล้ว

      I am waiting for your reply

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      @@villurisatya5132 Hello Villuri, Yes it can be changed manually. Within the OS, or even the network infrastructure along the path can adjust it.

    • @villurisatya5132
      @villurisatya5132 2 ปีที่แล้ว

      @@ChrisGreer Thank you Chris... I saw your video on congestion avoidence which is actually slowing down the mss once it reach to the specific limit but it's not actually avoiding the congestion
      I saw ECN is doing the congestion avoidence... Could you please do the video on ECN flag ... With wireshark captures

  • @andreffrosa
    @andreffrosa 2 ปีที่แล้ว

    What happens in ipv6?

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      For IPv6, fragmentation is handled by the endpoints, not the network infrastructure. Check out datatracker.ietf.org/doc/html/rfc2460#page-18 for more info.

  • @drapala97
    @drapala97 หลายเดือนก่อน

    why MTU is decimal not binary?

    • @ChrisGreer
      @ChrisGreer  หลายเดือนก่อน

      Can you clarify the question? Any number you see can be displayed either way. Not sure what you’re looking for.

  • @nayan271984
    @nayan271984 2 ปีที่แล้ว

    Why offset bit is always 8 bit?

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Hello Nayan. Only 13 bits in the header are used to indicate the offset. If this represented a bit-level offset, we could only offset up to 1024 bytes, which is not even up to the max MTU in most environments. Counting bytes allows for a byte offset up to 8192, which is more in line with the purpose of needing a fragment in the first place. At this point we can't adjust the number of bits allocated without breaking the protocol. So... bytes it is!

    • @nayan271984
      @nayan271984 2 ปีที่แล้ว

      @@ChrisGreer I really appreciate your quick reply and explanation.

    • @nayan271984
      @nayan271984 2 ปีที่แล้ว

      I have one more question but not with Fragmentation. How browser is using existing session to do ssl handshake. I thought browser will reuse existing session ID from previous SSL handshake. Today I capture logs for one website, I access the site first then kept the browser idle for 5 min and then again refresh the same page. I have seen client hello going out but then I see this message "Change Cipher Spec, Application Data" from my system. There was no server hello msg and when I checked session ID then that was also different. not sure on what basis my browser did ssl handshake.

  • @javabysaqib3303
    @javabysaqib3303 2 ปีที่แล้ว

    Also gift us Udemy course 😁