Decrypting TLS, HTTP/2 and QUIC with Wireshark

แชร์
ฝัง
  • เผยแพร่เมื่อ 30 มิ.ย. 2024
  • Learn how to decrypt HTTPS, TLS and the new QUIC protocol.
    Wireshark course: davidbombal.wiki/chriswireshark
    Nmap course: davidbombal.wiki/chrisnmap
    // MENU //
    0:00 ▶️ Introduction
    1:25 ▶️ What is HTTPS vs HTTP2 vs QUIC
    6:30 ▶️ What is QUIC
    9:42 ▶️ How long have we been using QUIC
    10:12 ▶️ Technical tour of QUIC
    14:18 ▶️ Why use QUIC instead of TCP
    17:48 ▶️ QUIC negotiation and support
    19:04 ▶️ Steps to decrypt TLS
    20:04 ▶️ Is Wireshark useless without the decryption keys
    22:16 ▶️ MITM
    23:47 ▶️ Advice on how do I learn Wireshark
    25:40 ▶️ TCP/IP Illustrated book
    25:54 ▶️ Rather focus on learning protocols instead of Wireshark
    26:35 ▶️ Next video ideas
    // LINKS //
    PCAP file: davidbombal.wiki/ssldecryptio...
    Previous video: • HTTPS Decryption with ...
    How to Decrypt SSL with Wireshark - HTTPS Decryption Guide: davidbombal.wiki/sslwireshark
    Man in the middle Python script: • iPhone and Android WiF...
    Chris shows TLS decryption: • How to DECRYPT HTTPS T...
    Chris Intro to Wireshark: • Wireshark Tutorial for...
    // MY STUFF //
    www.amazon.com/shop/davidbombal
    // SOCIAL //
    Discord: / discord
    Twitter: / davidbombal
    Instagram: / davidbombal
    LinkedIn: / davidbombal
    Facebook: / davidbombal.co
    TikTok: / davidbombal
    TH-cam: / davidbombal
    //CHRIS GREER //
    Udemy course: davidbombal.wiki/chriswireshark
    LinkedIn: / cgreer
    TH-cam: / chrisgreer
    Twitter: / packetpioneer
    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
    wireshark
    quic
    http2
    http
    https
    tls
    ssl
    https decryption
    quic decryption
    tls decryption
    wireshark tls
    wireshark ssl
    https wireshark
    tls wireshark
    ssl wireshark
    ccna
    cisco ccna
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
    #quic#tls #wireshark
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 219

  • @davidogedegbe1591
    @davidogedegbe1591 2 ปีที่แล้ว +48

    This is a very educative piece. Brilliant conversation and enlightening. Thanks Dave and Chris

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +2

      Glad you enjoyed it David!

  • @fritzbiederstadt4869
    @fritzbiederstadt4869 2 ปีที่แล้ว +3

    One complication I've run into is tracing the QUIC back to STUN and TCP. I've created various profiles to help me visualize the UDP Stream, then to the QUIC and STUN IDs. Also, I've been doing performance analysis using TCP with encrypted payloads for a good while now...TCP behavior analysis provides as gold mind of practical performance data show which direction latency is coming from, TCP deadlocks, etc. TCP Illustrate is one of the best, if not the TCP learning narratives. Great Video!

  • @CyberModCC
    @CyberModCC 2 ปีที่แล้ว +23

    Thank you for the calm and relaxed way you manage to convey content without any form of sensation seeking or unnecessary shouting like many other youtubers do.

    • @brocholy9289
      @brocholy9289 2 ปีที่แล้ว +2

      Trueee so calm and respectfull and brooo this is so nice to learn with that kind of attitude

    • @mendodsoregonbackroads6632
      @mendodsoregonbackroads6632 6 หลายเดือนก่อน +1

      Totally agree. I learn better from a conversational pace. Absorption is key.

  • @CarolineMathieson
    @CarolineMathieson 2 ปีที่แล้ว +17

    Thing to remember that QUIC was needed because the TCP and UDP protocols cannot be upgraded because the internet connections are full of hardware called middle boxes that can't get firmware upgrades. To provide a better protocol, QUIC was built on top of UDP to give the benefits of TCP without too many of the overheads of TCP.

    • @ko-Daegu
      @ko-Daegu 2 ปีที่แล้ว +3

      But that sounds like it takes away the benefits of TCP ?
      Also what are middle box’s what’s the official name ?
      Also can someone hijack the Quic connection ID steal the response from the target and use them to impersonate the target to hijack the stream ?
      Making the server feels like yeah this is the same device only different ip ?

    • @toromac9786
      @toromac9786 2 ปีที่แล้ว

      @@ko-Daegu this was my immediate thought. I can only assume that the keys are required too

    • @Marshdweller
      @Marshdweller ปีที่แล้ว

      To me it sounds like udp over TCP. Udp being the protocol that quic is taking advantage of.

  • @okoliealexander3069
    @okoliealexander3069 2 หลายเดือนก่อน +1

    I feel it's important to convey information of this level of sensitivity in a calm way so that the information finds its way to the brain and remains there. You guys have done justice to the topic and the manner of rendering. Thank you, a lot.

  • @satyanarayansahoo7608
    @satyanarayansahoo7608 2 ปีที่แล้ว +3

    #David & #Chris, You both are brilliant human beings. You create videos with higher honesty so that people can learn and earn and you guys never keep any suspense for the viewers. I have observed, that you always ask the correct question even if the guests try to divert from the main topic. Wonderful work for the community. You deserve a lot of blessings. You can understand how much satisfaction I have watching your series.

  • @cdenver
    @cdenver 2 ปีที่แล้ว +7

    I remember my teacher in college trying to tell me that HTTPS was secure in 2012. It was not secure in 2012, he tried to make me look like an idiot even though I showed him proof. Thanks for the video David and Chris!

    • @dean6125
      @dean6125 2 ปีที่แล้ว

      why was it not secure?

    • @DanielSunBerlin
      @DanielSunBerlin 2 ปีที่แล้ว

      ​@@dean6125 not https was insecure, some libs where. en.wikipedia.org/wiki/Heartbleed

    • @babel0118
      @babel0118 2 ปีที่แล้ว

      One always has a chance to avoid MITM when looking at the certificate. HTTPS is not rendered unsecure when one decides to disregard the alarms and trust the connection

  • @yogananda8703
    @yogananda8703 2 ปีที่แล้ว +9

    I would like to see a video on how to identify the dodge stuff happening. They way Chris explained on how can we go ahead and find it out that’s interesting. Please make that content as soon as possible

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +4

      That video is coming soon 😀

    • @hamedindex7117
      @hamedindex7117 2 ปีที่แล้ว

      Identify is certainly

  • @jk_tecs
    @jk_tecs 2 ปีที่แล้ว +5

    This's so thoughtful of you guys... Delivering such a tutorial you have provided a lot of information in a simplified way. Thank you so much #David & #Chris for that

  • @fredericoamigo
    @fredericoamigo ปีที่แล้ว

    Thank you so much for this! This helps me a lot in my CS-degree. My lectures often just name drop all of this protocols and jargon, but don’t really go over them I practice - so these vids are really helpful to give my curriculum some context. Keep up the good and important work guys!

  • @Zerback
    @Zerback 2 ปีที่แล้ว +1

    Thank you David and Chris for this! I'm still learning a lot of cyber and networking, and you guys are helping A LOT!

  • @TheTAKNO
    @TheTAKNO 2 ปีที่แล้ว +6

    Amazing teachers. I am so blessed I'm learning all this for free and at the highest quality. Thank you gentlemen.

    • @Odim65
      @Odim65 5 หลายเดือนก่อน

      IKR

  • @davidbombal
    @davidbombal  2 ปีที่แล้ว +11

    Learn how to decrypt TLS, HTTP/2 and QUIC using Wireshark.
    // MENU //
    0:00 ▶ Introduction
    1:25 ▶ What is HTTPS vs HTTP2 vs QUIC
    6:30 ▶ What is QUIC
    9:42 ▶ How long have we been using QUIC
    10:12 ▶ Technical tour of QUIC
    14:18 ▶ Why use QUIC instead of TCP
    17:48 ▶ QUIC negotiation and support
    19:04 ▶ Steps to decrypt TLS
    20:04 ▶ Is Wireshark useless without the decryption keys
    22:16 ▶ MITM
    23:47 ▶ Advice on how do I learn Wireshark
    25:40 ▶ TCP/IP Illustrated book
    25:54 ▶ Rather focus on learning protocols instead of Wireshark
    26:35 ▶ Next video ideas
    // LINKS //
    PCAP file: davidbombal.wiki/ssldecryptionpcap
    Previous video: th-cam.com/video/GMNOT1aZmD8/w-d-xo.html
    How to Decrypt SSL with Wireshark - HTTPS Decryption Guide: davidbombal.wiki/sslwireshark
    Man in the middle Python script: th-cam.com/video/O1jpck31Ask/w-d-xo.html
    Chris shows TLS decryption: th-cam.com/video/5qecyZHL-GU/w-d-xo.html
    Chris Intro to Wireshark: th-cam.com/video/OU-A2EmVrKQ/w-d-xo.html
    // MY STUFF //
    www.amazon.com/shop/davidbombal
    // SOCIAL //
    Discord: discord.com/invite/usKSyzb
    Twitter: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    TH-cam: th-cam.com/users/davidbombal
    //CHRIS GREER //
    Udemy course: davidbombal.wiki/chriswireshark
    LinkedIn: www.linkedin.com/in/cgreer/
    TH-cam: th-cam.com/users/ChrisGreer
    Twitter: twitter.com/packetpioneer
    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

    • @fahadbawazir1771
      @fahadbawazir1771 2 ปีที่แล้ว

      Sure David sir

    • @mrpoliticalguy5602
      @mrpoliticalguy5602 2 ปีที่แล้ว

      Hi i got a question in a cisco router how to i assign myself a autonomous system number? when i get one from a internet registry.?

  • @jetmirrajta6486
    @jetmirrajta6486 2 ปีที่แล้ว +4

    Great stuff! Thanks a lot David & Chris for sharing the knowledge. Your channel really helping with my studies. Bless 🙏

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +1

      Great to hear that!

  • @alkeshmathur4546
    @alkeshmathur4546 2 ปีที่แล้ว

    Both the gurus I follow 🙌 Chris you and Lisa Bock have really helped my journey with Wireshark. David of course you are genius - has helped me step up GNS3 labs and helped me with NETMIKO Automation!! Thank you guys for revolutionizing Network Industry!! We definitely need people like you to ease the pain points in Networking.

  • @abrazbashar
    @abrazbashar 2 ปีที่แล้ว +2

    I was just looking for this topic a while ago! Thanks for delivering sir!

  • @jeffarends8843
    @jeffarends8843 2 ปีที่แล้ว

    I love the detail that these videos are going into. Keep it up!

  • @kumarswamy19
    @kumarswamy19 ปีที่แล้ว +1

    Just brilliant! Concise and precise information. Thanks to you two.

  • @Bilal.Al-Sardar
    @Bilal.Al-Sardar 2 ปีที่แล้ว +3

    This is brilliant, thanks a lot David & Chris!.

  • @Gamelover22478
    @Gamelover22478 ปีที่แล้ว

    Packets are so cool man! I was so hyped watching this video and seeing how all of this data is around us. Thanks for helping me understand this information

  • @samratchapagain4804
    @samratchapagain4804 2 ปีที่แล้ว +1

    Thanks David and chris for this precious session. I know now what a QUIC is.

  • @billiraydray
    @billiraydray 2 ปีที่แล้ว

    watching and learning everyday from this channel. Thank you so much David and Chris
    love from Sierra Leone

  • @sethadu9045
    @sethadu9045 2 ปีที่แล้ว

    Thanks so much, David and Chris for the wonderful information delivered

  • @vyasG
    @vyasG 2 ปีที่แล้ว

    Thank you David and Chris for this video. Looking forward for the next video.

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +2

      Thank you for watching!

  • @alexandruszabo
    @alexandruszabo 2 ปีที่แล้ว

    I was waiting for this part! Thank you!

  • @shawn8163
    @shawn8163 2 ปีที่แล้ว

    Awesome videos with Chris! Keep up the good work.

  • @ramnarayana100
    @ramnarayana100 2 ปีที่แล้ว +1

    Love you guys keep up the good work, hope more videos coming from you guys together.

  • @techlearner4806
    @techlearner4806 6 หลายเดือนก่อน

    03:45 Thanks David for adding this addon (within the main session). Otherwise, it creates confusion that, on one side, Chris mentioned that everything is happening on one TCP session and, on the other side, Chris mentioned "You can think of each stream as an individual TCP connection." So, basically everything is happening on the main TCP connection but due to advance functionality of the HTTP 2.0, multiple streams are working as on separate TCP connection for better functionality and better user experience.

  • @wonderpets5523
    @wonderpets5523 ปีที่แล้ว

    Thank you, sir bombal, for your passionate tutorials!

  • @nickybesters
    @nickybesters 2 ปีที่แล้ว

    Another smash hit from the David and Chris Show! Just what the doctor ordered and there's even a part 3 on the horizon - boy are we in for a treat... I wonder what's in store for Christmas 😀🥳🌲

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +1

      Thank you for watching Nick!

  • @jhonl.799
    @jhonl.799 2 ปีที่แล้ว

    Hii, David, I am a new subscriber. I am sad that I didn't find your channel before. I bought multiple of your course at a discount. I am excited to put in the time and hours during this winter. I was hoping to see a roadmap for 2022.

  • @CmdrStukov
    @CmdrStukov 2 ปีที่แล้ว +1

    Excellent series. Absolutely loving it!

  • @HardwaremagazineBrasil
    @HardwaremagazineBrasil 2 ปีที่แล้ว +2

    Very informative! Thank you! Your channel is amazing!

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +1

      Glad you think so!

  • @majiddehbi9186
    @majiddehbi9186 2 ปีที่แล้ว +1

    hi Mr Bombal it's such good opportunity that chris is here and so we can get the advantage to learn from both of you guys God bless u both thx

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว

      You're welcome Majid

    • @ChrisGreer
      @ChrisGreer 2 ปีที่แล้ว

      Thanks for the comment Majid! Great to meet you.

  • @malfoytech4601
    @malfoytech4601 2 ปีที่แล้ว +1

    Very informative. Keep making this kinda networking and cyber security videos.

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +1

      Thank you so much!

  • @ugyentshering6086
    @ugyentshering6086 2 ปีที่แล้ว

    Building the filters and pointing out the weird stuffs from the packets would be fun 😊.. Thank you so much

  • @moboladekolawole8349
    @moboladekolawole8349 2 ปีที่แล้ว +1

    I really enjoy this duo.

  • @forgotthisone
    @forgotthisone 2 ปีที่แล้ว +1

    Very good video!
    Actually entertaining and learnt a lot
    I'm actually really happy I saw this

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว

      Really happy to hear that 😀

  • @ranjanadissanayaka5390
    @ranjanadissanayaka5390 ปีที่แล้ว +1

    this is interesting, learned a lot . thanks both of you.

  • @pinedajulio1814
    @pinedajulio1814 ปีที่แล้ว

    Thank you very much for making it simple and easy to comprehend how to use wireshark 🎉

  • @joydipsamanta1167
    @joydipsamanta1167 ปีที่แล้ว

    Thank you David and Chris…So nice explanation…..❤️

  • @grinder2401
    @grinder2401 2 ปีที่แล้ว +1

    Thanks David and Chris! Please also do some MITM stuff.

  • @kevingendron5586
    @kevingendron5586 2 ปีที่แล้ว

    Another outstanding video!

  • @gcobanindzoyi4547
    @gcobanindzoyi4547 2 ปีที่แล้ว

    Hey David you make nice and understandable videos keep them coming :)

  • @peterlodang6012
    @peterlodang6012 2 ปีที่แล้ว +2

    Deeply in love with your channel and courses in udemy too.

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว

      Happy to hear that Peter!

  • @lastebo
    @lastebo 2 ปีที่แล้ว

    Thank you Chris, Thank you David!!! Amazing!!!

  • @alexjem6736
    @alexjem6736 2 ปีที่แล้ว +1

    Very interessting topic.... thanks for new Updates 🇩🇪

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว

      You're welcome Alex!

  • @Eyaas_Ajmal
    @Eyaas_Ajmal 2 ปีที่แล้ว +3

    Thanks David for all your great contents and courses, love them.

  • @gyangaha109
    @gyangaha109 2 ปีที่แล้ว

    very great questioning and explanation

  • @Alain9-1
    @Alain9-1 2 ปีที่แล้ว +1

    great, waiting for more 👏👏👏

  • @medfac2010
    @medfac2010 ปีที่แล้ว

    Thank you very much for this detailed explanation I appreciate it

  • @prolificinvestigations
    @prolificinvestigations 2 ปีที่แล้ว

    This guy Chris, the dude has knowledge they don't kick in college :-) A1 content Dave & Chris

  • @adityashetty1135
    @adityashetty1135 2 ปีที่แล้ว

    It's so good sir... Looking forward for more contents with David and Chris sir...😃😃

  • @dinieshvc8069
    @dinieshvc8069 2 ปีที่แล้ว

    really super and good information about QUIC, thanks david

  • @Warlock1515
    @Warlock1515 2 ปีที่แล้ว

    Super cool video!!

  • @FrankShortt
    @FrankShortt 2 ปีที่แล้ว

    Brilliant stuff!

  • @arch417powersports
    @arch417powersports 2 ปีที่แล้ว

    Very informative, thank you!

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว

      Thank you for watching!

  • @luigigarella5756
    @luigigarella5756 ปีที่แล้ว

    Chris and David Bravo! Just so calm explaining with ease. Thank you so much for this video(s). VERY HELPFUL. @Chris;where can I get that T-Shirt?

  • @Optinix-gz1qg
    @Optinix-gz1qg 2 ปีที่แล้ว

    Great stuff!

  • @simonagger
    @simonagger ปีที่แล้ว

    you guys rock! thanks for the tips

  • @dannydyer4444
    @dannydyer4444 2 ปีที่แล้ว

    Looking forward to the next installment, which is specifically of interest to me since i have a bit of a cyber stalking issue.

  • @aleksandrsvyrydenko9094
    @aleksandrsvyrydenko9094 2 ปีที่แล้ว

    Brilliant content!

  • @ErycOyugi
    @ErycOyugi 2 ปีที่แล้ว

    awesome content dave

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว

      Thank you Eryc! I really appreciate that!

  • @clementyves6154
    @clementyves6154 2 ปีที่แล้ว

    Thanks for your job !

  • @ncbowden1963
    @ncbowden1963 2 ปีที่แล้ว

    Excellent content. Very informative.

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว

      Glad you like it! Thank you Nigel!

  • @poojithapriya2370
    @poojithapriya2370 2 ปีที่แล้ว +3

    You are the best teacher. Lots of love to U David❤️❤️❤️❤️

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว

      Thank you very much!

  • @offensiveredteam
    @offensiveredteam ปีที่แล้ว

    You are worth millions respect 🙏

  • @ca7986
    @ca7986 2 ปีที่แล้ว

    What an amazing talk.

  • @ermias736
    @ermias736 2 ปีที่แล้ว

    wow its is so helpfull, thanks u david keep going the good work.

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว

      Glad it was helpful! Thank you!

  • @majidalikhanquaid984
    @majidalikhanquaid984 2 ปีที่แล้ว

    great video ❤

  • @raghupanamukkil
    @raghupanamukkil 2 ปีที่แล้ว

    Really informative one. Thank you

  • @gabrielannk
    @gabrielannk 2 ปีที่แล้ว +1

    What a crossover 👏 ❤

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +1

      Glad you are enjoying the content 😄

  • @anandsinghdhouni
    @anandsinghdhouni 2 ปีที่แล้ว

    Really awesome information , Thanks you both sir

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว

      Thank you! I really appreciate that!

  • @iterminator987
    @iterminator987 2 ปีที่แล้ว +1

    Hello, was wondering if the decryption could be done using a MITM, for instance the MITM proxy...Would be great to see that happening perhaps in ur next video with Chris!!!!

  • @mateusnunes4290
    @mateusnunes4290 2 ปีที่แล้ว

    Awesome content!

  • @fernandomendieta5463
    @fernandomendieta5463 2 ปีที่แล้ว

    More of this please 🥰

  • @user-xe3ys9xl6w
    @user-xe3ys9xl6w ปีที่แล้ว

    Love You Sir❤
    From India in Kerala......🎉

  • @lallu1122
    @lallu1122 ปีที่แล้ว

    EXCELLENT!!! 10/10

  • @privilegedesign8745
    @privilegedesign8745 2 ปีที่แล้ว

    Excelent points

  • @tylercoombs1
    @tylercoombs1 2 ปีที่แล้ว

    I've been following QUIC for many moons now, as soon as I had the chance to switch over i did. The speed of UDP with TLS 1.3 is far superior. Doing huge data dumps is so much faster and it's much more reliable and secure.

  • @alejandrorodriguez3771
    @alejandrorodriguez3771 2 ปีที่แล้ว +1

    I thought multi-path TCP would be the evolution on transport layer, now I am skeptical.
    Edit: OH! Now I did a litle google search, and came across Multi-Path QUIC. My head just exploted !!

  • @WolfIonGaming
    @WolfIonGaming 2 ปีที่แล้ว

    Love this content David and Chris! I'm doing a project for my DFIR Class and we are using wireshark to analyze the packets thanks for this helps to understand more.

  • @freedomfighter3486
    @freedomfighter3486 ปีที่แล้ว

    Awesome!

  • @kianooshmehrandish7187
    @kianooshmehrandish7187 3 หลายเดือนก่อน

    cool as always

  • @mandezadamz4556
    @mandezadamz4556 ปีที่แล้ว

    I would really appreciate it guys if you could illustrate how can we use wireshark to analyze WhatsApp web packages and be able to identify the location of the sender, that's for the 1st Qs
    2nd question is : how hackers can use our ip address and specify which websites we have registered to using our email and pswd, i've heard that in a video but they didn't show what tool they use to get the websites we sign up to using the ip address
    I want to whether or not this is true
    And thank you for such quality content, really helps

  • @bexultanalipov5915
    @bexultanalipov5915 2 ปีที่แล้ว

    This video deserves more views

  • @marounahel8205
    @marounahel8205 ปีที่แล้ว

    i understood,thank you

  • @jindalabhishek1
    @jindalabhishek1 2 ปีที่แล้ว

    @Chris, Thanks mate

    • @ChrisGreer
      @ChrisGreer 2 ปีที่แล้ว

      Great! Glad you liked the content.

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว

      Glad you enjoyed the video Abhishek!

  • @tonym5857
    @tonym5857 2 ปีที่แล้ว

    Againg a usefull video, since old days called Ethereal, Wireshark is a swiss army 💪

  • @mariaalkin1271
    @mariaalkin1271 ปีที่แล้ว +1

    Not to mention this will make it more difficult to do port scanning.. Especially, if the firewall filters ICMP responses. For example, if I'm running an API over QUIC using port 34000 for an IoT device and my IoT software firewall filters port unreachable ICMP that port will look the same as any other... You'd have to craft a QUIC initial packet and assume it's QUIC for each port or simply MITM the device. With TCP all ports that are open must respond to a SYN.

    • @mariaalkin1271
      @mariaalkin1271 ปีที่แล้ว +1

      You could technically guard against this too.. if the IoT device connected to your Wi-Fi and then got time from NTP and your phone app does the same you both have a time reference to prevent packet replay attacks. Then the IoT device could not listen for anything until an encrypted broadcast packet hit it telling it to listen on port X for Y time which would be a PSK at the time of factory. You could MITM it to see what port was picked for this session but it would be encrypted and make it more difficult to reverse engineer - likely moving to disassembling the app or IoT device itself.

  • @killerx8902
    @killerx8902 2 ปีที่แล้ว

    Awesome content. Chris is an amazing guy. I would love to see a man in the middle attack. More difficult = More valuable 😍. Thank you

  • @NabinChaudry
    @NabinChaudry 2 ปีที่แล้ว

    THANK YOU SO MUCH

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว

      You're welcome! Thank you for watching!

  • @hennessy6996
    @hennessy6996 2 ปีที่แล้ว

    Hi all, this was a great session. I'm blown away. Question though, doesn't QUIC inhibits security appliances from detecting or scanning the user's traffic, for example, a user at the corporate website visited a website that was prohibited, if QUIC was used to open the session to access the website, the security appliance would not be able to block the website, is that correct?

  • @lallu1122
    @lallu1122 ปีที่แล้ว

    BEST ON TH-cam

  • @richardjay1791
    @richardjay1791 2 ปีที่แล้ว

    this seems much better

  • @lohphat
    @lohphat ปีที่แล้ว

    Isn’t IPSEC considered a different transport protocol than TCP & UDP? Since it has its own IP protocol number (ESP 50 and AH 51) or are these being used less frequently? I know AH breaks with NAT so isn’t used that often except gateway to gateway tunnels.

  • @EduardKhiaev
    @EduardKhiaev 2 ปีที่แล้ว

    If I recall right there is an inner layer of TLS in QUIC can you show us how to decrypt that one?

  • @prasanthravichandran626
    @prasanthravichandran626 2 ปีที่แล้ว

    Does QUIC have any packet format or does it uses UDP's one coz I remembered in UDP there is no part like destination id but needed some clarifications here
    Thanks😊

  • @omaralhalboosi2713
    @omaralhalboosi2713 2 ปีที่แล้ว

    THANK YOU , THANK YOU , THANK YOU, if I keep saying thank you wont be enough , the information shared here is enough to pass and impress an employer , really thank you David , ad Chris . I know I wont use these info daily as I am a network engineer but the knowledge is worthy . May God bless you all.

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว

      You're welcome Omar! So happy to hear that!

  • @blowyourmind4625
    @blowyourmind4625 2 ปีที่แล้ว

    Nice 😎