Plaintext Packets
Plaintext Packets
  • Видео 40
  • Просмотров 456 547
10 Ways Companies Track You Online
In this video I quickly run through 10 ways large companies are able to track your activities and build a profile on you as you use their services. This includes concepts such as ad networks, cookies, voice assistants, physical tracking in stores and more.
Useful links:
Support the channel:
buymeacoffee.com/plaintextpm
Discord:
discord.gg/CV5DzzaYF5
Просмотров: 830

Видео

How Governments Watch the Web - Why Absolutely Privacy Online Doesn't Exist
Просмотров 4,1 тыс.16 часов назад
In this second instalment of my privacy series, I cover how governments and big tech aggregate data to effectively monitor all users on the internet. We cover how data is captured using network taps, how popular websites provide data feeds, and the tools used to analyze it all. Useful links: Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
What Can Your ISP See? - What Your ISP Knows About Your Internet Activities
Просмотров 11 тыс.19 часов назад
In this video I show you just what information your internet provider (ISP) can determine from analyzing your traffic. This includes what websites you visit, and in some cases just what you're doing on this websites. I also cover what benefits VPNs have to safeguard your traffic, while explaining that absolute privacy on the internet doesn't really exist. Useful links: Support the channel: buym...
Learn TCP with Shell Shockers and Wireshark!
Просмотров 887День назад
In this video I do a deep dive into the TCP protocol by analyzing traffic from the game Shell Shockers! I cover: - Finding the IP of a specific web connection using Developer tools and conversation views - TCP theory and comparisons to UDP - The three-way handshake in detail - IP vs TCP conversations - Sequence / acknowledgement analysis - Live Shell Shockers action! :) Useful links: Support th...
How NMAP Works and How to Detect Port Scans in Wireshark
Просмотров 2,3 тыс.14 дней назад
In this video I demonstrate how port scanning works using the popular tool NMAP. I dig into some theory on how NMAP can detect a port is open, show you how to detect a port scan in a Wireshark capture, then cover some ways to deter and obfuscate your services from scanning. Useful links: Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
Hacking WiFi: Sniffing Traffic from Open Networks
Просмотров 1,9 тыс.21 день назад
In this highly requested video I will be showing you how to sniff traffic from open wifi networks and analyze in Wireshark. I also cover why open wifi is so dangerous and why VPNs can protect you when you have no choice but to connect. Useful links: How to Make a Bootable Kali Linux USB: www.kali.org/docs/usb/live-usb-install-with-windows/ For wifi adapters that support monitor mode, Google 'wi...
Troubleshoot Docker Network Issues Using Wireshark
Просмотров 54721 день назад
In this video I troubleshoot some network performance issues in Docker using tcpdump and Wireshark. I show you how to build a custom image containing tcpdump, how to capture the data, and dive into some advanced Wireshark analysis to figure out the network issue. Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
Learn How the Address Resolution Protocol (ARP) Works in 10 Minutes
Просмотров 1,3 тыс.Месяц назад
In this video I do a quick overview of the address resolution protocol, commonly known as ARP. I explain why MAC addresses are needed when communicating on a local network and how ARP helps populate mac address tables on networked-devices. Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
Free ISP Tracking in 5 Minutes - Netprobe Quick Tutorial
Просмотров 2,2 тыс.Месяц назад
In this quick tutorial, I show you how to install and use the free open-sourced tool Netprobe to monitor the quality of your ISP connection over time. Total install time is about 5 minutes. For a full tutorial see the link below. To get started with Netprobe: 1. Download the repo here: github.com/plaintextpackets/netprobe_lite 2. Install docker: docs.docker.com/engine/install/ 3. From the comma...
Track Your Internet Quality for Free - Netprobe Full Tutorial
Просмотров 62 тыс.Месяц назад
In this continuation video to 'Speed Overkill - How ISPs Sell You Bandwidth You Don't Need', I show you how to install and use the free open-sourced tool Netprobe to monitor the quality of your ISP connection over time. We cover a little theory on how Netprobe works, how to get the app launched in docker, and finally how to read the data from each metric. To get started with Netprobe: 1. Downlo...
How to Filter Conversations in Wireshark
Просмотров 1 тыс.Месяц назад
In this video I will be showing you how to use Wireshark to drill down and filter the conversations you need to investigate. We cover some theory about IP vs TCP/UDP conversations, show you how to use the conversation view, and demonstrate two ways to build display filters. Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
Speed Overkill: How ISPs Sell You Bandwidth Instead of Performance (+ Bonus Free ISP Monitor Tool)
Просмотров 19 тыс.Месяц назад
In this video I demonstrate how ISPs sell you more bandwidth than you actually need, when what you're really looking for is a reliable network which carries your traffic with minimal latency and loss. I dive into the three main factors which make up connection quality (bandwidth, latency and loss), explain why speedtests are almost useless, and show you how to estimate how much bandwidth you ac...
Wireshark Freestyle #2 - Finding Secrets in Open Wifi Networks
Просмотров 1,5 тыс.Месяц назад
In this freestyle (full speed) video I show you all the information you can ascertain from users on an open WIFI network using Wireshark. I demonstrate why open WIFI networks are insecure, and explain how services like VPN can help protect your data from sniffers. Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
Learn How Speedtest.net Works Using Wireshark
Просмотров 3,1 тыс.2 месяца назад
In this video we use Wireshark to demonstrate how the popular website Speedtest.net measures your internet bandwidth. We talk about the theory of TCP and congestion control, and show you how to capture and analyze the Speedtest traffic in real time. Useful videos: How to Capture Traffic in Wireshark - ruclips.net/video/wI2qfO61iFw/видео.html Support the channel: buymeacoffee.com/plaintextpm Dis...
How to Measure YouTube Bandwidth Using Wireshark
Просмотров 1,5 тыс.2 месяца назад
How to Measure RUclips Bandwidth Using Wireshark
How to Smuggle Data with Ping Part 2 - Windows Version
Просмотров 3,3 тыс.2 месяца назад
How to Smuggle Data with Ping Part 2 - Windows Version
How to Smuggle Data out of the Network with Ping
Просмотров 116 тыс.2 месяца назад
How to Smuggle Data out of the Network with Ping
Extract TLS Certificates using Wireshark
Просмотров 5 тыс.2 месяца назад
Extract TLS Certificates using Wireshark
Wireshark for Cable Technicians - How to Prove that Internet Access is Healthy
Просмотров 2,6 тыс.2 месяца назад
Wireshark for Cable Technicians - How to Prove that Internet Access is Healthy
Wireshark for Helpdesk Analysts - Troubleshooting a User's Website Issue
Просмотров 1,8 тыс.3 месяца назад
Wireshark for Helpdesk Analysts - Troubleshooting a User's Website Issue
Why Should You Learn Wireshark?
Просмотров 2,2 тыс.3 месяца назад
Why Should You Learn Wireshark?
How to Capture Traffic in Wireshark
Просмотров 2,4 тыс.3 месяца назад
How to Capture Traffic in Wireshark
How to Take Down a Wifi Network from Within
Просмотров 2,4 тыс.3 месяца назад
How to Take Down a Wifi Network from Within
How to DoS Your Network with this One Command
Просмотров 8 тыс.3 месяца назад
How to DoS Your Network with this One Command
Extract Passwords from Telnet using Wireshark
Просмотров 1,8 тыс.3 месяца назад
Extract Passwords from Telnet using Wireshark
Community Captures #1 Troubleshooting SMTP with Wireshark
Просмотров 6154 месяца назад
Community Captures #1 Troubleshooting SMTP with Wireshark
Prove that an API is Slow and the Network is Great!
Просмотров 9934 месяца назад
Prove that an API is Slow and the Network is Great!
How to Listen to Phone Calls in Wireshark
Просмотров 130 тыс.4 месяца назад
How to Listen to Phone Calls in Wireshark
Wireshark Freestyle #1 - Small Network Problems
Просмотров 1,1 тыс.4 месяца назад
Wireshark Freestyle #1 - Small Network Problems
Detecting Packet Loss in RTP Phone Calls Using Wireshark
Просмотров 1,3 тыс.4 месяца назад
Detecting Packet Loss in RTP Phone Calls Using Wireshark

Комментарии

  • @thienviet3429
    @thienviet3429 6 часов назад

    Can my isp see my full link? I mean my isp is able to see what I am doing from my link, don’t they? 9:08 If not, then I don’t have any questions.

  • @garylove2836
    @garylove2836 День назад

    You could always use elons musk starlink with a vpn concentrator and you don’t need isp.

  • @gf.calabretta
    @gf.calabretta День назад

    Google: "machine, learn this" ✌🏽

  • @dadadies
    @dadadies День назад

    Are you censoring me or is youtube censoring me.

  • @skytechbits
    @skytechbits День назад

    ISP companies are regulated by the government so of course they can see everything everyone does.

  • @S_I_P_R_N_E_T
    @S_I_P_R_N_E_T День назад

    I am so glad I came across your channel. I am using NORDVPN via ASUS Router and OPENVPN but still....very informative. Keep up the good work.

  • @derickasamani5730
    @derickasamani5730 День назад

    I dislke this, if an attacker is already in your network blocking ping is the least of your worries

  • @JamsODonnell100
    @JamsODonnell100 День назад

    Thanks so much. Really relatable. That you are able to demonstrate how things work in ‘real life’ use, is genius, to me. Next level tutorial.

  • @codeman99-dev
    @codeman99-dev День назад

    Seems like the ISP's latency should also be measured at bare minimum. Any IP hosted directly by the ISP will do. Ideally you also correct all other latency values against the ISP value.

    • @plaintextpackets
      @plaintextpackets День назад

      Because the tool requires no config changes to run the first time I left that out but you can easily modify one of the targets to be your own ISP

  • @Azpalon
    @Azpalon День назад

    You are stupidly wrong. Your statement "Absolute privacy on the internet doesn't exist" is inaccurate, there are many forms of encryption and obfuscation. git gud.

  • @benoit.gerin-lajoie
    @benoit.gerin-lajoie 2 дня назад

    Yes BUT... how much will that monitoring hinder one's Internet activities like... looking at videos at the same time as browsing, etc... ?

    • @plaintextpackets
      @plaintextpackets День назад

      Uses very small amounts of bandwidth (if that’s your question)

  • @PracticalPcGuide
    @PracticalPcGuide 2 дня назад

    Very good video. easy to understand and follow. need another wireshark dns analysis tutorial using a program VPN vs vpn as a browser extension vs Tor browser. no dns showing while on tor..

  • @user-tv4ki7yc1k
    @user-tv4ki7yc1k 2 дня назад

    Why cant they inspect my device as this would solve my problem as the hackers would be caught but in Australia they are so useless that they lie to sell and investigations into fraud are not properly executed and they are enabling the hackers.

  • @mitchellsmith4601
    @mitchellsmith4601 2 дня назад

    This guy is spreading FUD. All the popular websites use HTTPS, it’s only smaller websites without much traffic which don’t. Why? Because more than ten years ago, Google announced they would favor HTTPS websites over HTTP websites in their search results, which incentivized almost everyone to use HTTPS.

    • @Azpalon
      @Azpalon День назад

      I agree 100%, There are many protocols and methods to retain privacy over the internet. This dude doesn't know what he is talking about, or maybe it's on purpose and he wants to scare people for some weird reason.

    • @plaintextpackets
      @plaintextpackets День назад

      So I actually cover that in the vid, and explicitly state that ‘what’ it is you’re doing is mostly obfuscated by HTTPS these days. I also cover in the next vid how most of those popular websites share data on your activities anyhow via various tracking methods.

    • @maxvideodrome4215
      @maxvideodrome4215 14 часов назад

      I own an ISP - we don’t look at anything.

  • @jwilk2107
    @jwilk2107 2 дня назад

    Excellent video brother...👍

  • @Placesandspaces35
    @Placesandspaces35 2 дня назад

    I use Quad 9 for DNS which is known for exceptional privacy set on my router. My external firewall has an unbound feature with the option to set that to encryption over a 3rd party vpn. From what i understand Quad 9 is not based out of a country subject to the 14 Eyes Alliance and the 3rd party vpn i use also is not based in a country subject to those laws as well. It may not be a full proof setup but i try to make it as hard as possible for any 3rd parties to monitor my traffic. Great video!

    • @plaintextpackets
      @plaintextpackets День назад

      Yeah that’s the best you can do. I cover this in a video that’s coming out in a few weeks but basically get a good DNS, get some form of ad tracking for your network and potentially use secure DNS as well if your VPN doesn’t tunnel it

    • @Placesandspaces35
      @Placesandspaces35 День назад

      @@plaintextpackets I need to check out that video. There was another one i saw that said be careful of using a vpn on all devices in a network because that can raise suspicion. With my external firewall i can pick out particular packets to send over a vpn without even putting the entire device on the vpn. I never was really into networking until a few years ago before I started learning what data entities can see ISPs, governments, etc.). Not to mention using public wifi which basically screams “look at me!”. 😅

  • @nigelholland24
    @nigelholland24 2 дня назад

    Great video learned a lot especially wireshark thanks

  • @ldandco
    @ldandco 2 дня назад

    Does a VPN offer any authentic type of protection from this ? Or are VPN providers simply honeypots ?

    • @plaintextpackets
      @plaintextpackets 2 дня назад

      I don’t think they are all feeding their logs to authorities all the time, no. But I do believe any company can be compelled secretly to provide those logsZ

    • @ldandco
      @ldandco День назад

      @@plaintextpackets Thanks ... I always thought about these well known VPN companies as a three letters organizations funded private companies that would "facilitate" information when needed. It is a centralized and easier way for them to get your data, rather than going to ISPs directly which would involve a bit more bureocracy and/or paperwork... but I may be wrong

  • @nigelholland24
    @nigelholland24 2 дня назад

    Great video but now can you do a video on how to reduce all this .thanks

  • @loreyoungtech
    @loreyoungtech 2 дня назад

    This is helpful content thanks.

  • @johnvardy9559
    @johnvardy9559 2 дня назад

    Great Work

  • @feiwoza
    @feiwoza 3 дня назад

    Thank you -- !!

  • @feiwoza
    @feiwoza 3 дня назад

    Great video again -- please do let us know when you have the tutorial for installing probe on docker

  • @johnycache
    @johnycache 3 дня назад

    Do you rate tailsOS?

  • @emanbuoy7673
    @emanbuoy7673 3 дня назад

    Ty

  • @user-rf7tz7pg8h
    @user-rf7tz7pg8h 3 дня назад

    Nice one man! I don't know how, but you definitely found a niche here. Never seen this topic explained so clearly and straight-to-the-point, even though I am interested in it for more than a decade now (privacy/tracking). You've got a new fan! Keep up the good work (it is indeed GOOD!) ;)

  • @peterfrisch8373
    @peterfrisch8373 3 дня назад

    Yes, this REALLY works. I installed it on a Raspberry Pi 4 and had it set up by 2130 hours. The next day around 0930 hours there was a decrease in my download bandwidth (-75%). Called into my ISP support line. Went through the typical trouble shooting steps and they checked their end and of course they said everything was alright, but they sent out a tech to check anyway. However, I did show him what I saw. He asked if I could email it to him, and I did along with printing it as well. Later that same day a friend of mine, on the far side of the next county, was having the same issue. Yes, same ISP. The install was easy, but just a bit involved and I am so glad I went through the trouble.

  • @shaunrowley7230
    @shaunrowley7230 3 дня назад

    Another great video the wider public do not have a clue and now that AI is using this data who knows what they know? Another database in the UK is again a marketing database but is what is known as the warranty database whenever you register for the warranty of a product whether online or via post all this data is stored in a database to send you details of future products, services etc. But here in the UK the database is avalabile to law enforcement and government agencies where for an example you have used your email address to login into a music download website but only last week you used the same email address to register a new laptop and added your phone and home address these details are now available and can be used to track you and if broken copyright laws there could be a knocking on your door.

  • @mx338
    @mx338 3 дня назад

    You can very specifically blame the US government and their agencies, as every other "western" government just cooperates with US intellegence, giving up access to their infrastructure, so they get some access to the globe dominating US spying network.

  • @mx338
    @mx338 3 дня назад

    One also theoretically problematic technology, is the prevelance of reverse proxy services/CDNs like CloudFlare or AWS CloudFront, which commonly cause a gap in TLS encryption, between your client and even smaller websites, that wouldn't be cooperating with intelegence.

  • @IOSALive
    @IOSALive 3 дня назад

    Plaintext Packets, I loved this video so much, I had to hit the like button!

  • @CyberAndy_
    @CyberAndy_ 3 дня назад

    garbage

  • @aaronletchford
    @aaronletchford 3 дня назад

    Would pi hole solve privacy, and stop the isp seeing your traffic

    • @plaintextpackets
      @plaintextpackets 3 дня назад

      Solves some, I will cover this in a video coming soon

    • @zadekeys2194
      @zadekeys2194 3 дня назад

      No. :) That's what DNS over Https or TLS is for :)

    • @zadekeys2194
      @zadekeys2194 3 дня назад

      Pi hole is just a local server, a middle man if you like. Requests still go to your ISP DNS, unless you configure your DNS to something like 9.9.9 .9or Ad-Guard DNS using secure DNS.

  • @justinception3277
    @justinception3277 3 дня назад

    Have you ever thought of reading for Libra Vox?

    • @plaintextpackets
      @plaintextpackets 3 дня назад

      I haven't, don't have any books to publish :)

    • @justinception3277
      @justinception3277 2 дня назад

      @@plaintextpackets I'd listen to your audiobook for sure.

  • @user-zz2ip7bx3y
    @user-zz2ip7bx3y 4 дня назад

    Great video!

  • @tonyruiz2046
    @tonyruiz2046 4 дня назад

    ⭐️👍⭐️

  • @CommsGuy
    @CommsGuy 4 дня назад

    Watching your video made me start thinking that an ISP should be able to see your search terms as well (when you use any search engine) because those search words are part of the URL. I never thought about that before.....

    • @plaintextpackets
      @plaintextpackets 4 дня назад

      That part they actually can’t as the URL path after the domain isn’t available in plaintext. They’ll see the DNS query for the search engine and the TLS connection to it but that’s it

    • @CommsGuy
      @CommsGuy 3 дня назад

      @@plaintextpackets Cool. I didn't realise the path wasn't plaintext. I've done a fair amount of wiresharking but never looked into the URL path. Thanks :)

  • @easygreasy3989
    @easygreasy3989 4 дня назад

    Everything u do will be laid bear to the coming generations.😅

  • @johnnycupcakes7
    @johnnycupcakes7 4 дня назад

    Thankyou for your time and effort with these videos

  • @truckerallikatuk
    @truckerallikatuk 5 дней назад

    If you have a court order, you don't bother with a tap, you just make them port mirror the uplink to your own server.

  • @JustSHorTT
    @JustSHorTT 5 дней назад

    First of all, thank you for giving us valuable information. I am a student and as I get information on such subjects, I am really happy as I learn. I would have a question for you about another subject. For example, when we talk about a topic related to my family, I immediately see advertisements on the phone, tablet, or computer related to the content we are talking about. How does this happen? Even if technology companies are listening to us, how does this immediately appear as an advertisement? Thanks in advance I am waiting for the continuation of the videos.

  • @justincase5272
    @justincase5272 6 дней назад

    NOT TRUE for anyone using TOR routed through a double-sided zero-knowledge VPN based in a country prohibiting any intrusion (including government) in combination with third-party secure DNS (passes DNSSEC; blocks ECS) with similar 2ZK and country privacy. At this point, you're five levels removed. Only malware on your machine can tie together you with where.

    • @plaintextpackets
      @plaintextpackets 5 дней назад

      True but the performance sucks that’s the trade off

  • @mikea785
    @mikea785 7 дней назад

    Just awesome!!!

  • @razorr1920
    @razorr1920 7 дней назад

    i just want to understand the implications of using a VPN + DNS OVER HTTPS

    • @anthonyb5174
      @anthonyb5174 6 дней назад

      VPN encrypts your traffic across the internet, while DNS over HTTPS encrypts your requests to the DNS server you have set (most likely your ISP)

    • @plaintextpackets
      @plaintextpackets 5 дней назад

      I’ll do a vid on various protection methods like dns sec, vpns, tor, etc

  • @mmaranta785
    @mmaranta785 7 дней назад

    In the 90’s I worked for a defense contractor that was building a telephone and internet recorder to be installed at phone companies, so yeah they are spying, I mean duh.

    • @plaintextpackets
      @plaintextpackets 5 дней назад

      The scale is different. So before they could listen into a conversation. Now the tools can listen into all conversations and aggregate

  • @m4a1mag
    @m4a1mag 7 дней назад

    so basically the government could find out about anything?

    • @plaintextpackets
      @plaintextpackets 5 дней назад

      Yup

    • @m4a1mag
      @m4a1mag 5 дней назад

      @@plaintextpackets hey bro would it be possible for you to make a video on how sql injection works ? i ve learnt a bit of it but ur way of explaining makes it better

    • @plaintextpackets
      @plaintextpackets 5 дней назад

      @m4a1mag sure I’ll add it to the list

    • @m4a1mag
      @m4a1mag 4 дня назад

      @@plaintextpackets thanks :)

    • @mx338
      @mx338 3 дня назад

      Not everything, a lot. For example, they surely know you use Signal, they might be able to corelate some of the people you're writing with, and when, but they don't know the content of your messages.

  • @m4a1mag
    @m4a1mag 7 дней назад

    interesting

  • @shaunrowley7230
    @shaunrowley7230 7 дней назад

    Another Excellent Video, I remember attending a Blackberry Conference in 2015 and the words on good deal of the slides were "Remember that every contact has a trace" that phrase has stuck with me ever since as it was true then and is today.

  • @UNcommonSenseAUS
    @UNcommonSenseAUS 7 дней назад

    How govts spy on every thIng : MONOPOLISED VIOLENCE

  • @xEndless11
    @xEndless11 7 дней назад

    The data traffic can be read by the Device over which the traffic is routed, i.e. in this case the gateway. Even if you are using a secure HTTPS connection, the probability is very high that the Google inputs in the search as well as your access data to which pages can be seen as plain text in the recording.

    • @plaintextpackets
      @plaintextpackets 7 дней назад

      Wireshark records the data as its leaving to the network adapter so everything that will be encrypted by the application layer is already encrypted.