- Видео 40
- Просмотров 456 547
Plaintext Packets
Канада
Добавлен 19 май 2015
Learn about networking and security with simple explanations for beginners, experts and everyone in between. We cover basic concepts, troubleshooting, security issues, coding and more!
10 Ways Companies Track You Online
In this video I quickly run through 10 ways large companies are able to track your activities and build a profile on you as you use their services. This includes concepts such as ad networks, cookies, voice assistants, physical tracking in stores and more.
Useful links:
Support the channel:
buymeacoffee.com/plaintextpm
Discord:
discord.gg/CV5DzzaYF5
Useful links:
Support the channel:
buymeacoffee.com/plaintextpm
Discord:
discord.gg/CV5DzzaYF5
Просмотров: 830
Видео
How Governments Watch the Web - Why Absolutely Privacy Online Doesn't Exist
Просмотров 4,1 тыс.16 часов назад
In this second instalment of my privacy series, I cover how governments and big tech aggregate data to effectively monitor all users on the internet. We cover how data is captured using network taps, how popular websites provide data feeds, and the tools used to analyze it all. Useful links: Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
What Can Your ISP See? - What Your ISP Knows About Your Internet Activities
Просмотров 11 тыс.19 часов назад
In this video I show you just what information your internet provider (ISP) can determine from analyzing your traffic. This includes what websites you visit, and in some cases just what you're doing on this websites. I also cover what benefits VPNs have to safeguard your traffic, while explaining that absolute privacy on the internet doesn't really exist. Useful links: Support the channel: buym...
Learn TCP with Shell Shockers and Wireshark!
Просмотров 887День назад
In this video I do a deep dive into the TCP protocol by analyzing traffic from the game Shell Shockers! I cover: - Finding the IP of a specific web connection using Developer tools and conversation views - TCP theory and comparisons to UDP - The three-way handshake in detail - IP vs TCP conversations - Sequence / acknowledgement analysis - Live Shell Shockers action! :) Useful links: Support th...
How NMAP Works and How to Detect Port Scans in Wireshark
Просмотров 2,3 тыс.14 дней назад
In this video I demonstrate how port scanning works using the popular tool NMAP. I dig into some theory on how NMAP can detect a port is open, show you how to detect a port scan in a Wireshark capture, then cover some ways to deter and obfuscate your services from scanning. Useful links: Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
Hacking WiFi: Sniffing Traffic from Open Networks
Просмотров 1,9 тыс.21 день назад
In this highly requested video I will be showing you how to sniff traffic from open wifi networks and analyze in Wireshark. I also cover why open wifi is so dangerous and why VPNs can protect you when you have no choice but to connect. Useful links: How to Make a Bootable Kali Linux USB: www.kali.org/docs/usb/live-usb-install-with-windows/ For wifi adapters that support monitor mode, Google 'wi...
Troubleshoot Docker Network Issues Using Wireshark
Просмотров 54721 день назад
In this video I troubleshoot some network performance issues in Docker using tcpdump and Wireshark. I show you how to build a custom image containing tcpdump, how to capture the data, and dive into some advanced Wireshark analysis to figure out the network issue. Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
Learn How the Address Resolution Protocol (ARP) Works in 10 Minutes
Просмотров 1,3 тыс.Месяц назад
In this video I do a quick overview of the address resolution protocol, commonly known as ARP. I explain why MAC addresses are needed when communicating on a local network and how ARP helps populate mac address tables on networked-devices. Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
Free ISP Tracking in 5 Minutes - Netprobe Quick Tutorial
Просмотров 2,2 тыс.Месяц назад
In this quick tutorial, I show you how to install and use the free open-sourced tool Netprobe to monitor the quality of your ISP connection over time. Total install time is about 5 minutes. For a full tutorial see the link below. To get started with Netprobe: 1. Download the repo here: github.com/plaintextpackets/netprobe_lite 2. Install docker: docs.docker.com/engine/install/ 3. From the comma...
Track Your Internet Quality for Free - Netprobe Full Tutorial
Просмотров 62 тыс.Месяц назад
In this continuation video to 'Speed Overkill - How ISPs Sell You Bandwidth You Don't Need', I show you how to install and use the free open-sourced tool Netprobe to monitor the quality of your ISP connection over time. We cover a little theory on how Netprobe works, how to get the app launched in docker, and finally how to read the data from each metric. To get started with Netprobe: 1. Downlo...
How to Filter Conversations in Wireshark
Просмотров 1 тыс.Месяц назад
In this video I will be showing you how to use Wireshark to drill down and filter the conversations you need to investigate. We cover some theory about IP vs TCP/UDP conversations, show you how to use the conversation view, and demonstrate two ways to build display filters. Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
Speed Overkill: How ISPs Sell You Bandwidth Instead of Performance (+ Bonus Free ISP Monitor Tool)
Просмотров 19 тыс.Месяц назад
In this video I demonstrate how ISPs sell you more bandwidth than you actually need, when what you're really looking for is a reliable network which carries your traffic with minimal latency and loss. I dive into the three main factors which make up connection quality (bandwidth, latency and loss), explain why speedtests are almost useless, and show you how to estimate how much bandwidth you ac...
Wireshark Freestyle #2 - Finding Secrets in Open Wifi Networks
Просмотров 1,5 тыс.Месяц назад
In this freestyle (full speed) video I show you all the information you can ascertain from users on an open WIFI network using Wireshark. I demonstrate why open WIFI networks are insecure, and explain how services like VPN can help protect your data from sniffers. Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
Learn How Speedtest.net Works Using Wireshark
Просмотров 3,1 тыс.2 месяца назад
In this video we use Wireshark to demonstrate how the popular website Speedtest.net measures your internet bandwidth. We talk about the theory of TCP and congestion control, and show you how to capture and analyze the Speedtest traffic in real time. Useful videos: How to Capture Traffic in Wireshark - ruclips.net/video/wI2qfO61iFw/видео.html Support the channel: buymeacoffee.com/plaintextpm Dis...
How to Measure YouTube Bandwidth Using Wireshark
Просмотров 1,5 тыс.2 месяца назад
How to Measure RUclips Bandwidth Using Wireshark
How to Smuggle Data with Ping Part 2 - Windows Version
Просмотров 3,3 тыс.2 месяца назад
How to Smuggle Data with Ping Part 2 - Windows Version
How to Smuggle Data out of the Network with Ping
Просмотров 116 тыс.2 месяца назад
How to Smuggle Data out of the Network with Ping
Extract TLS Certificates using Wireshark
Просмотров 5 тыс.2 месяца назад
Extract TLS Certificates using Wireshark
Wireshark for Cable Technicians - How to Prove that Internet Access is Healthy
Просмотров 2,6 тыс.2 месяца назад
Wireshark for Cable Technicians - How to Prove that Internet Access is Healthy
Wireshark for Helpdesk Analysts - Troubleshooting a User's Website Issue
Просмотров 1,8 тыс.3 месяца назад
Wireshark for Helpdesk Analysts - Troubleshooting a User's Website Issue
How to Capture Traffic in Wireshark
Просмотров 2,4 тыс.3 месяца назад
How to Capture Traffic in Wireshark
How to Take Down a Wifi Network from Within
Просмотров 2,4 тыс.3 месяца назад
How to Take Down a Wifi Network from Within
How to DoS Your Network with this One Command
Просмотров 8 тыс.3 месяца назад
How to DoS Your Network with this One Command
Extract Passwords from Telnet using Wireshark
Просмотров 1,8 тыс.3 месяца назад
Extract Passwords from Telnet using Wireshark
Community Captures #1 Troubleshooting SMTP with Wireshark
Просмотров 6154 месяца назад
Community Captures #1 Troubleshooting SMTP with Wireshark
Prove that an API is Slow and the Network is Great!
Просмотров 9934 месяца назад
Prove that an API is Slow and the Network is Great!
How to Listen to Phone Calls in Wireshark
Просмотров 130 тыс.4 месяца назад
How to Listen to Phone Calls in Wireshark
Wireshark Freestyle #1 - Small Network Problems
Просмотров 1,1 тыс.4 месяца назад
Wireshark Freestyle #1 - Small Network Problems
Detecting Packet Loss in RTP Phone Calls Using Wireshark
Просмотров 1,3 тыс.4 месяца назад
Detecting Packet Loss in RTP Phone Calls Using Wireshark
Can my isp see my full link? I mean my isp is able to see what I am doing from my link, don’t they? 9:08 If not, then I don’t have any questions.
You could always use elons musk starlink with a vpn concentrator and you don’t need isp.
Google: "machine, learn this" ✌🏽
Are you censoring me or is youtube censoring me.
ISP companies are regulated by the government so of course they can see everything everyone does.
I am so glad I came across your channel. I am using NORDVPN via ASUS Router and OPENVPN but still....very informative. Keep up the good work.
I dislke this, if an attacker is already in your network blocking ping is the least of your worries
Think corporate employees
Thanks so much. Really relatable. That you are able to demonstrate how things work in ‘real life’ use, is genius, to me. Next level tutorial.
Glad it was helpful!
Seems like the ISP's latency should also be measured at bare minimum. Any IP hosted directly by the ISP will do. Ideally you also correct all other latency values against the ISP value.
Because the tool requires no config changes to run the first time I left that out but you can easily modify one of the targets to be your own ISP
You are stupidly wrong. Your statement "Absolute privacy on the internet doesn't exist" is inaccurate, there are many forms of encryption and obfuscation. git gud.
LOL
Lool good morning to you too!
Yes BUT... how much will that monitoring hinder one's Internet activities like... looking at videos at the same time as browsing, etc... ?
Uses very small amounts of bandwidth (if that’s your question)
Very good video. easy to understand and follow. need another wireshark dns analysis tutorial using a program VPN vs vpn as a browser extension vs Tor browser. no dns showing while on tor..
Noted
Why cant they inspect my device as this would solve my problem as the hackers would be caught but in Australia they are so useless that they lie to sell and investigations into fraud are not properly executed and they are enabling the hackers.
This guy is spreading FUD. All the popular websites use HTTPS, it’s only smaller websites without much traffic which don’t. Why? Because more than ten years ago, Google announced they would favor HTTPS websites over HTTP websites in their search results, which incentivized almost everyone to use HTTPS.
I agree 100%, There are many protocols and methods to retain privacy over the internet. This dude doesn't know what he is talking about, or maybe it's on purpose and he wants to scare people for some weird reason.
So I actually cover that in the vid, and explicitly state that ‘what’ it is you’re doing is mostly obfuscated by HTTPS these days. I also cover in the next vid how most of those popular websites share data on your activities anyhow via various tracking methods.
I own an ISP - we don’t look at anything.
Excellent video brother...👍
Thanks 👍
I use Quad 9 for DNS which is known for exceptional privacy set on my router. My external firewall has an unbound feature with the option to set that to encryption over a 3rd party vpn. From what i understand Quad 9 is not based out of a country subject to the 14 Eyes Alliance and the 3rd party vpn i use also is not based in a country subject to those laws as well. It may not be a full proof setup but i try to make it as hard as possible for any 3rd parties to monitor my traffic. Great video!
Yeah that’s the best you can do. I cover this in a video that’s coming out in a few weeks but basically get a good DNS, get some form of ad tracking for your network and potentially use secure DNS as well if your VPN doesn’t tunnel it
@@plaintextpackets I need to check out that video. There was another one i saw that said be careful of using a vpn on all devices in a network because that can raise suspicion. With my external firewall i can pick out particular packets to send over a vpn without even putting the entire device on the vpn. I never was really into networking until a few years ago before I started learning what data entities can see ISPs, governments, etc.). Not to mention using public wifi which basically screams “look at me!”. 😅
Great video learned a lot especially wireshark thanks
Glad you enjoyed it
Does a VPN offer any authentic type of protection from this ? Or are VPN providers simply honeypots ?
I don’t think they are all feeding their logs to authorities all the time, no. But I do believe any company can be compelled secretly to provide those logsZ
@@plaintextpackets Thanks ... I always thought about these well known VPN companies as a three letters organizations funded private companies that would "facilitate" information when needed. It is a centralized and easier way for them to get your data, rather than going to ISPs directly which would involve a bit more bureocracy and/or paperwork... but I may be wrong
Great video but now can you do a video on how to reduce all this .thanks
It’s coming next week
Great looking forward to it. Thank you.
This is helpful content thanks.
Great Work
Thank you -- !!
Great video again -- please do let us know when you have the tutorial for installing probe on docker
Do you rate tailsOS?
Ty
Nice one man! I don't know how, but you definitely found a niche here. Never seen this topic explained so clearly and straight-to-the-point, even though I am interested in it for more than a decade now (privacy/tracking). You've got a new fan! Keep up the good work (it is indeed GOOD!) ;)
Yes, this REALLY works. I installed it on a Raspberry Pi 4 and had it set up by 2130 hours. The next day around 0930 hours there was a decrease in my download bandwidth (-75%). Called into my ISP support line. Went through the typical trouble shooting steps and they checked their end and of course they said everything was alright, but they sent out a tech to check anyway. However, I did show him what I saw. He asked if I could email it to him, and I did along with printing it as well. Later that same day a friend of mine, on the far side of the next county, was having the same issue. Yes, same ISP. The install was easy, but just a bit involved and I am so glad I went through the trouble.
Great!
Another great video the wider public do not have a clue and now that AI is using this data who knows what they know? Another database in the UK is again a marketing database but is what is known as the warranty database whenever you register for the warranty of a product whether online or via post all this data is stored in a database to send you details of future products, services etc. But here in the UK the database is avalabile to law enforcement and government agencies where for an example you have used your email address to login into a music download website but only last week you used the same email address to register a new laptop and added your phone and home address these details are now available and can be used to track you and if broken copyright laws there could be a knocking on your door.
You can very specifically blame the US government and their agencies, as every other "western" government just cooperates with US intellegence, giving up access to their infrastructure, so they get some access to the globe dominating US spying network.
One also theoretically problematic technology, is the prevelance of reverse proxy services/CDNs like CloudFlare or AWS CloudFront, which commonly cause a gap in TLS encryption, between your client and even smaller websites, that wouldn't be cooperating with intelegence.
Plaintext Packets, I loved this video so much, I had to hit the like button!
Thanks!
i watched it twice
garbage
Would pi hole solve privacy, and stop the isp seeing your traffic
Solves some, I will cover this in a video coming soon
No. :) That's what DNS over Https or TLS is for :)
Pi hole is just a local server, a middle man if you like. Requests still go to your ISP DNS, unless you configure your DNS to something like 9.9.9 .9or Ad-Guard DNS using secure DNS.
Have you ever thought of reading for Libra Vox?
I haven't, don't have any books to publish :)
@@plaintextpackets I'd listen to your audiobook for sure.
Great video!
Thanks!
⭐️👍⭐️
Watching your video made me start thinking that an ISP should be able to see your search terms as well (when you use any search engine) because those search words are part of the URL. I never thought about that before.....
That part they actually can’t as the URL path after the domain isn’t available in plaintext. They’ll see the DNS query for the search engine and the TLS connection to it but that’s it
@@plaintextpackets Cool. I didn't realise the path wasn't plaintext. I've done a fair amount of wiresharking but never looked into the URL path. Thanks :)
Everything u do will be laid bear to the coming generations.😅
☝️
Thankyou for your time and effort with these videos
My pleasure!
If you have a court order, you don't bother with a tap, you just make them port mirror the uplink to your own server.
They don’t even need the order
First of all, thank you for giving us valuable information. I am a student and as I get information on such subjects, I am really happy as I learn. I would have a question for you about another subject. For example, when we talk about a topic related to my family, I immediately see advertisements on the phone, tablet, or computer related to the content we are talking about. How does this happen? Even if technology companies are listening to us, how does this immediately appear as an advertisement? Thanks in advance I am waiting for the continuation of the videos.
I’m making a video on this :-)
@@plaintextpackets Thankyou So Much
NOT TRUE for anyone using TOR routed through a double-sided zero-knowledge VPN based in a country prohibiting any intrusion (including government) in combination with third-party secure DNS (passes DNSSEC; blocks ECS) with similar 2ZK and country privacy. At this point, you're five levels removed. Only malware on your machine can tie together you with where.
True but the performance sucks that’s the trade off
Just awesome!!!
Thanks!
i just want to understand the implications of using a VPN + DNS OVER HTTPS
VPN encrypts your traffic across the internet, while DNS over HTTPS encrypts your requests to the DNS server you have set (most likely your ISP)
I’ll do a vid on various protection methods like dns sec, vpns, tor, etc
In the 90’s I worked for a defense contractor that was building a telephone and internet recorder to be installed at phone companies, so yeah they are spying, I mean duh.
The scale is different. So before they could listen into a conversation. Now the tools can listen into all conversations and aggregate
so basically the government could find out about anything?
Yup
@@plaintextpackets hey bro would it be possible for you to make a video on how sql injection works ? i ve learnt a bit of it but ur way of explaining makes it better
@m4a1mag sure I’ll add it to the list
@@plaintextpackets thanks :)
Not everything, a lot. For example, they surely know you use Signal, they might be able to corelate some of the people you're writing with, and when, but they don't know the content of your messages.
interesting
Another Excellent Video, I remember attending a Blackberry Conference in 2015 and the words on good deal of the slides were "Remember that every contact has a trace" that phrase has stuck with me ever since as it was true then and is today.
Still very true
How govts spy on every thIng : MONOPOLISED VIOLENCE
The data traffic can be read by the Device over which the traffic is routed, i.e. in this case the gateway. Even if you are using a secure HTTPS connection, the probability is very high that the Google inputs in the search as well as your access data to which pages can be seen as plain text in the recording.
Wireshark records the data as its leaving to the network adapter so everything that will be encrypted by the application layer is already encrypted.