Wireshark - Malware traffic Analysis

Поделиться
HTML-код
  • Опубликовано: 25 дек 2024

Комментарии • 259

  • @phennessey3
    @phennessey3 3 года назад +62

    This was more informative then my worthless college professor and textbook combined. Not only did I pass my lab because of this video, I also learned a lot. Thank you for sharing with us!!!!!!!!!!

  • @HazelJLMboya
    @HazelJLMboya Год назад +7

    I'm just 5mins into this and it's sooo helpful.Totally assisted in better understanding of wireshark. Thank you .
    NOT ALL HEROES WEAR CAPES!!!

  • @brooklynzoo81
    @brooklynzoo81 5 лет назад +38

    This was presented and broken down very well. Thank you ! Subscribed

    • @HackeXPlorer
      @HackeXPlorer  5 лет назад

      Thank you for your feedback, appreciate it.

    • @TirthPatel7923
      @TirthPatel7923 4 года назад

      Hey bro, I have a project to do on Wireshark, I have to analyze the files, can you please help me out please, like we can meet on zoom

  • @theconcierge9301
    @theconcierge9301 3 года назад +8

    that was the best explaination i´ve ever seen on youtube. bravo! you should bring more content out about wireshark and live examples. great!

  • @happyagain855
    @happyagain855 3 года назад +14

    This the most informative, hands on video I've watched on this tube about this subject...Just amazing man. Thank you very much.

    • @HackeXPlorer
      @HackeXPlorer  3 года назад

      Thank you for the valuable feedback :)

    • @jadielkyle6077
      @jadielkyle6077 3 года назад

      I dont mean to be off topic but does someone know a trick to get back into an Instagram account?
      I was stupid forgot my password. I love any tips you can give me

  • @FrankTranDesign
    @FrankTranDesign 3 года назад +3

    Dang, this is super informative. It's 2021, and this video is still ultra useful. Thank you!

    • @HackeXPlorer
      @HackeXPlorer  3 года назад

      The source material i referred to was even older. But still this is the fundamentals 😁. But builds a strong foundation

  • @little_trash_panda
    @little_trash_panda 2 года назад +1

    I'm a master student and this video is very helpful for me to do my homework. It is so informative! Thank you.

    • @HackeXPlorer
      @HackeXPlorer  2 года назад +1

      I am glad that this helped you,do let me know what kind of other topics that will be helpful for your studies.

  • @Foxx999
    @Foxx999 3 года назад +10

    Excellent presentation, I actually used this for a guide and was able to make a lot more sense of what I was seeing, Thanks a mil!

    • @HackeXPlorer
      @HackeXPlorer  3 года назад

      Thank you for the feedback fox, highly appreciate it

  • @abdoumjid9122
    @abdoumjid9122 4 года назад +9

    First of all, I want to thank you for the logical processes that you've shared here in this video, you have my subscription and like, and please make some playlists about every tool.

  • @cyb3rmeerk4t51
    @cyb3rmeerk4t51 4 года назад +4

    Hopefully more episodes of this as well. Thank you for sharing your knowledge

  • @nicholegoh6574
    @nicholegoh6574 7 месяцев назад

    life saver really was so lost with an assignment due tmr and chanced upon this video thanku sm !!

  • @tomasguagniniiglesias3798
    @tomasguagniniiglesias3798 2 года назад +2

    Amazing, really clear, you are a great instructor. As I read on a comment below, I learned more from you in 16 min that from textbooks and professor in college

    • @HackeXPlorer
      @HackeXPlorer  2 года назад +1

      Thank you for the feedback Tomas

  • @TwoWheelRay
    @TwoWheelRay 2 года назад

    I've learned quite a bit knowledge on his analysis. I'm surprise this channel haven't blew up yet. Subscribed for more!! lets go!

  • @emmanuelmarosi3736
    @emmanuelmarosi3736 3 года назад +1

    this is the best wireshark tutorial

  • @Cyber_Jagat
    @Cyber_Jagat Год назад

    I had been looking for this type of worth content and in this video you covered a lot. Thanks for a worthy video.

  • @Toczusiek
    @Toczusiek 4 года назад +4

    You rock man, I needed it to do my university exercise. Thank you so much :)

    • @TirthPatel7923
      @TirthPatel7923 4 года назад

      Hey bro, I have a project to do, analyzing the pcap files.. It would be nice of you if you can help me out. PLEASEEE, like we can do a google meet meeting or zoom or something that you like. PLEASE

    • @ashanlahiru8020
      @ashanlahiru8020 3 года назад

      Hey bro, I want a help from both of you For my Uni Assignmnt.. Please Can You??

  • @hilkokriel5659
    @hilkokriel5659 4 года назад +1

    WOW!! Crazy level of detail and new-user friendly. Thank you very much for uploading.

  • @ruthawele2102
    @ruthawele2102 3 года назад

    Omg this is the best malware capture vid for Wireshark, Thank you so much for explaining step-by-step. its really helped me in packet analysis and hunting. Thanks mate!!!

    • @HackeXPlorer
      @HackeXPlorer  3 года назад

      You are welcome Ruth, thank-you for the feedback.

  • @josephnduati1214
    @josephnduati1214 4 года назад +2

    Very well explained and demonstrated. You made a confusing subject easy to understand. Thank you!

    • @HackeXPlorer
      @HackeXPlorer  4 года назад

      Thankyou for the feedback Joseph 👍

    • @TirthPatel7923
      @TirthPatel7923 4 года назад

      Hey bro, I have a project to do, analyzing the pcap files.. It would be nice of you if you can help me out. PLEASEEE, like we can do a google meet meeting or zoom or something that you like. PLEASE

  • @shafrinainn365
    @shafrinainn365 2 года назад +1

    Very informative and very good explanation. Thank you.

  • @highlights973
    @highlights973 Месяц назад +2

    i wish iwatched this earlier i would pass my interview with flying colors

  • @konulaslanova2608
    @konulaslanova2608 2 года назад +1

    Excellent. You made it so clear.

  • @nashimahmed7035
    @nashimahmed7035 5 лет назад +2

    Found something very interesting... really like to see such videos upcoming.. Thanks for sharing !!

  • @ashutoshrajput988
    @ashutoshrajput988 3 года назад

    the best video on youtube till now. thanks

  • @dsha31
    @dsha31 Год назад

    Very well done..Will be sharing with my SOC team.

  • @njayapavithra1705
    @njayapavithra1705 3 года назад +1

    Amazing, the author explained it so easy. Thank you

  • @leestaton1697
    @leestaton1697 3 года назад

    good channel I like how you go in depth regarding wireshark Ive got wireshark

    • @HackeXPlorer
      @HackeXPlorer  3 года назад +1

      Thankyou Lee, appreciate the valuable feedback.

  • @barkath005
    @barkath005 Год назад

    Thanks for the easy step by step guidance. Appreciate your efforts. 👍👍👍

  • @nilanjenator
    @nilanjenator 3 года назад

    Echoing other comments - nice, well made video. Good focus on teaching, rather than video production. At the same time, very practical information.

    • @HackeXPlorer
      @HackeXPlorer  3 года назад +1

      Thank you for the feedback Nilanjan. Appreciate it a lot.

  • @lokeshavm8366
    @lokeshavm8366 Год назад

    Great explanation, Please keep posting more videos.

  • @chirojitsarkar
    @chirojitsarkar 4 года назад

    Fantastic Explanation. It is really helpful for WIRESHARK Beginners.

    • @HackeXPlorer
      @HackeXPlorer  4 года назад +1

      Glad it was helpful! Thank you Chirojit.

  • @rashmiraghukumar5821
    @rashmiraghukumar5821 2 года назад

    Thanks, alot!!! for uploading this informative video, I really learned a lot about Wireshark ethereal

  • @skatetown100
    @skatetown100 3 года назад +1

    Excellent .. just excellent !!!!! Thanks for this!!

  • @sambitsahoo1123
    @sambitsahoo1123 3 года назад +1

    Careful! He's a hero!!! Subscribed !!!

  • @BiharCentralSchool
    @BiharCentralSchool 3 года назад +1

    Absolutely Brilliant EXplanantion

  • @muratafsar9753
    @muratafsar9753 4 года назад +3

    This is amazing work. Thank you sir. Subscribed !

    • @HackeXPlorer
      @HackeXPlorer  4 года назад

      Thank you for the feedback ,Murat

  • @Martin-ot7xj
    @Martin-ot7xj Год назад

    Hi there, it was a very very useful & informative tutorial video. please upload more about Wireshark. thnx

  • @johnjohn7549
    @johnjohn7549 3 года назад +1

    Very interesting and presented in a clear manner. Was a little fast a points, but can hopefully learn those bits later.

  • @georgegonduan8464
    @georgegonduan8464 Год назад +1

    Thanks for the help to understanding wireshark

  • @v380riMz
    @v380riMz 2 года назад

    Thanks alot, that export objects is extremely helpful which I didn't know about!

  • @devislight
    @devislight 3 года назад

    Brilliant, clear and great clarity in the delivery. Thank you so much. 👍👏

  • @yadvindersingh4656
    @yadvindersingh4656 3 года назад

    The flow was great. Thanks for sharing

  • @ravindra.waghmare
    @ravindra.waghmare 4 года назад +1

    Wonderful...very nicely explained.!!

  • @muruga403
    @muruga403 5 лет назад +4

    Thank you very much for sharing your knowledge, it's very useful
    Milles merci

  • @fritzbiederstadt4869
    @fritzbiederstadt4869 2 года назад

    Outstanding video about using Wireshark for security related purposes. I've been doing protocol analysis for a long time with various protocol analyzers, Wireshark is my hands-down favorite. However I've only used it for TCP and application performance analysis and troubleshooting. Although I've had thoughts about getting into the security side of things since, there has been some hesitation. My experience with performance analysis is advanced with computer communication protocols, service layers, etc. Learned a lot - I believe I will download and work through some of this. I'm already using most of the same methodology on the performance analysis side, so it should easy to transfer over my skills. Thanks!

    • @HackeXPlorer
      @HackeXPlorer  2 года назад

      Thankyou for you feedback Fritz, these keep me motivated to make more videos like this

  • @yeayea8334
    @yeayea8334 10 месяцев назад +1

    1:30 sample packet capture
    2:10 setting layout
    2:38 protocols
    4:00 type a filter vs use this window
    5:00 host name ➡️ apply as a column
    7:25 infected file how they appear?
    8:45 VirusTotal to check files
    9:27 how to get the hash of file
    10:06 Virus Total

  • @Leokhawarizmi
    @Leokhawarizmi 3 года назад

    I have learned so much today just in one video, thank you so much please keep going

    • @HackeXPlorer
      @HackeXPlorer  3 года назад +1

      Glad this was helpful, thankyou Leo.

  • @acostamanuel2011
    @acostamanuel2011 4 года назад

    Great step by step video. Exactly what i was looking for!!

  • @Kinoti9
    @Kinoti9 4 года назад

    Wow that was really really smooth. Thanks. Subbed already

  • @PADARIAD
    @PADARIAD 3 года назад

    No bu****It, right to the point! Love it! you are awesome!

    • @HackeXPlorer
      @HackeXPlorer  3 года назад

      Thankyou for the valuable feedback Darpan.

  • @trendyniro
    @trendyniro 2 года назад

    very practical, was able to understand easily. Kudos!

  • @lawrencestowe7070
    @lawrencestowe7070 4 года назад

    Really good video, great advice with columns etc

  • @bolimov
    @bolimov 2 года назад

    amazing video. simply explained. thanks for the content.

    • @HackeXPlorer
      @HackeXPlorer  2 года назад +1

      Thank you for your feedback, appreciate it

  • @KonulAtakishiyeva-t3w
    @KonulAtakishiyeva-t3w 16 дней назад +1

    Great, thanks a lot!

  • @riyazshaikh6373
    @riyazshaikh6373 4 года назад

    Amazing stuff. presented in a very easy manner to understand.

  • @pchebbi
    @pchebbi 4 года назад

    Nice explanation with good demo. Thank you!

  • @tanaysamanta4730
    @tanaysamanta4730 2 года назад

    Really man! This video was amazing! Thank you!

  • @artember1200
    @artember1200 4 года назад

    Great work,very informative and professional

    • @HackeXPlorer
      @HackeXPlorer  4 года назад

      Thankyou for the feedback Artem.

  • @showvik012
    @showvik012 4 года назад

    Keep them videos coming. Good work!

  • @awaisshakir1
    @awaisshakir1 5 лет назад

    Your work is exceptional 👍 please make more videos soon

    • @HackeXPlorer
      @HackeXPlorer  5 лет назад +1

      hey Shakir, thanks for the feedback. yah hope to do more soon. stay tuned

  • @josed4540
    @josed4540 5 лет назад +1

    This was very helpful please make more packet analysis videos, maybe other attacks like XSS, beaconing activity and Trojans. Thank you.

    • @HackeXPlorer
      @HackeXPlorer  5 лет назад

      Thank you Tony, valuable suggestions. I'll add these topics to my future work.

  • @Jackie_Labrador
    @Jackie_Labrador 2 года назад +1

    Excellent video :) Thanks

  • @youssefelankoud6497
    @youssefelankoud6497 5 лет назад +1

    Thank you so much, this video it's very useful, keep sharing your knowledge

    • @HackeXPlorer
      @HackeXPlorer  5 лет назад +1

      You are welcome, and thankyou for the feedback. Appreciate it.

  • @lastofdev777
    @lastofdev777 3 года назад

    Thank you man, I really need it for my assigment.

    • @HackeXPlorer
      @HackeXPlorer  3 года назад

      Glad this helped you, thanx for the feedback

  • @captainnemonic
    @captainnemonic 3 года назад

    Great presentation and information. Thanks!

  • @fudbalskafilozofija2818
    @fudbalskafilozofija2818 2 года назад

    TNice tutorials tutorial is so good, tysm

  • @vengalachandu4080
    @vengalachandu4080 2 года назад

    Excellent # keep doing 👏 👍

  • @ImranShaikh-kt7ey
    @ImranShaikh-kt7ey 3 года назад

    Amazing episode 🔥🔥🔥

  • @ReligionAndMaterialismDebunked

    Thanks, fellow ethical hacker!

  • @gwcloete1072
    @gwcloete1072 2 года назад +1

    wow this is a great video, make more videos, or a udemy course 👏👏👏👏👏

  • @pnn0656
    @pnn0656 4 года назад

    Thanks for such a nice video, you have explained very well and thisbis very very helpful for me

    • @HackeXPlorer
      @HackeXPlorer  4 года назад

      You are welcome, thanks for the feedback

  • @ms7414
    @ms7414 Год назад

    Very useful and well done video. I only wish you had expounded more on the other suspicious server little more in depth. Thanks.

  • @mohamadsalhani
    @mohamadsalhani 9 месяцев назад +1

    Thanks a lot for your efforts. Could you please send again the link of the traffic sample? The one in the description was not opened. I think you used the version 2014 (MTA-2014-files-contains-malware.zip), then the pw should be infected_2014, it also was not worked. Thanks in advance.

  • @kranthikumari7703
    @kranthikumari7703 3 года назад +1

    Best informative video ever. Keep posting more. This video really helped me understanding analysis. I gave practical try with all the available data. One thing where I lost and now worried is , sample Java extension which downloaded from PCAP data is disappearing after 5 to 10 secs. Can you please help or say why it disappears

    • @HackeXPlorer
      @HackeXPlorer  3 года назад +1

      Hi Kranthi, nice hear this helped you. The reason the file is disappear is because the antivirus is deleting the file. Would recommend you do this in Virtual windows box with AV disabled.

    • @kranthikumari7703
      @kranthikumari7703 3 года назад

      ​@@HackeXPlorer your reply did really helped, thanks for your response. i got one more doubt. i used hashmyfiles on windows but for ubuntu i didn't find any application for checking the hash of a file. since i tried this on ubuntu on my VM. so on Linux, there are command-based hash findings but my worry is if I use command-based
      1) will those malicious files get accessed and will my ubuntu machine gets infected.
      2) is there any app like filemyhash like on windows for ubuntu too. Really appreciate for your time and response.

    • @HackeXPlorer
      @HackeXPlorer  3 года назад +2

      Hi Again, linux is the best way to saflly analyse a windows malware
      1) no using the command line options wont execute the malware.
      Ex sha1sum {filename} md5sum {filename} are some of thr commandline options u can use
      2)no need of a additional application in linux to check the hass values, we used hashmyfiles in windows as there was no built in command link tool ik windows at the time, but now you can use PowerShell commands instead of the above application.
      Use Get-FileHash command.
      docs.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/get-filehash?view=powershell-7.1

    • @kranthikumari7703
      @kranthikumari7703 3 года назад +1

      @@HackeXPlorer Thanks for clarifying. Already love step by step explanation. Now repect for timely response and clarifying. please keep sharing knowledge. Thankyou.

  • @NanthaGopalJ-o6r
    @NanthaGopalJ-o6r Год назад

    Good explanation and new information.

  • @_admin_user
    @_admin_user 2 года назад +1

    very informative video

  • @mohdfirdaus5237
    @mohdfirdaus5237 4 года назад

    Thanks man. Great Explanation.

  • @ghitansilviu2389
    @ghitansilviu2389 3 года назад

    nice man, tks , i didn.t know how to see the host name. i do now...

  • @christiancortes5467
    @christiancortes5467 2 года назад +1

    Hello I've noticed something strange when you said the Source Address that can be found in IPv4 = The infected machine, but doesn't the Source Address mean where the packet is coming from i.e., the infected website? And the destination is where it's sending it to i.e., infected machine. So, does that mean you have the two values of infected machine and infected website mixed up? Tia.

    • @HackeXPlorer
      @HackeXPlorer  2 года назад +2

      Hi , here the source IP means the infected host (172.16.*.*), which requested the data from destination (37.200.*.*) . hope you got it

    • @christiancortes5467
      @christiancortes5467 2 года назад +1

      @@HackeXPlorer tysm for the reply, by infected host do you mean the machine and destination is where it got it from? Could I know how to get the end time of a packet? Ty again your vids really help :)

    • @HackeXPlorer
      @HackeXPlorer  2 года назад +2

      @@christiancortes5467 Think like this, the computer that download malware is the source, since it initiated the traffic. It's downloaded from the destination which is the web site.
      For packet end time i would use the next pack start time in the conversation.

    • @christiancortes5467
      @christiancortes5467 2 года назад +1

      @@HackeXPlorer thanks!!

  • @dhanukawickramasinghe9290
    @dhanukawickramasinghe9290 3 года назад

    thank you man. it was really helpful

  • @orca2162
    @orca2162 4 года назад

    Great explanation - thank you

    • @HackeXPlorer
      @HackeXPlorer  4 года назад

      Many thanks for the feedback Orca.

  • @yelinsoe3428
    @yelinsoe3428 2 года назад

    Prefect informations!

  • @jaystu7151
    @jaystu7151 2 года назад +1

    how do you know which file is infected ? considering there was alot of files there on the export objects > https

    • @HackeXPlorer
      @HackeXPlorer  2 года назад

      as I showed you one way is checking the hash of the file in VT, there other is running the file on a sand box like any.run to check its behavior

  • @saby826
    @saby826 3 года назад

    Very well explained.

  • @immunesicness3399
    @immunesicness3399 3 года назад

    Finaly some info to work with

  • @sonujalwal4768
    @sonujalwal4768 2 года назад

    very informative video thanks

  • @channel98-jcrx-tv58
    @channel98-jcrx-tv58 3 года назад +1

    Thank you man!

  • @GiggleYohoo
    @GiggleYohoo 4 года назад +1

    This is good. Btw, how to block incoming IP to your network using wireshark? Also, is it possible to change IP from IPV6 to IPV4 in wireshark? Thanks

    • @HackeXPlorer
      @HackeXPlorer  4 года назад +1

      Hi wireshark can only be used to.analyse traffic. None of the mentioned is possible with this tool.

  • @ashanlahiru8020
    @ashanlahiru8020 3 года назад +1

    Hi! While doing this practical, I need to save these 3 malware files to my pc. I'm not doing the practical in a virtual machine. So will it harm my pc if i save those 3 files to my pc?
    please respond cuz it means a lot to me since I'm doing this for a uni assignment 🥺

    • @HackeXPlorer
      @HackeXPlorer  3 года назад +1

      Simply Save them in a password protected zip file. The malware will not able to run in this condition, also this will prevent you from accidentally opening them

    • @ashanlahiru8020
      @ashanlahiru8020 3 года назад +1

      @@HackeXPlorer Ok Bro Thank you..

  • @amirghost281
    @amirghost281 3 года назад

    Thanks bro , you saved me 👍

  • @tugrulserhat
    @tugrulserhat 3 года назад

    very nicely done video. thanks a lot

  • @prasanthkumar6808
    @prasanthkumar6808 3 года назад +1

    Sir, We are missing your videos now a days... We urge you to do some

    • @HackeXPlorer
      @HackeXPlorer  3 года назад +2

      Some ideas are in-progress, will release soon

    • @prasanthkumar6808
      @prasanthkumar6808 3 года назад +1

      @@HackeXPlorer Do more videos on jAR files de-obfuscation techniques sir

  • @aravindchan2664
    @aravindchan2664 4 года назад +1

    Whether would you teach in any online apps or methods . I need to know about wireshark in wider mannner

    • @HackeXPlorer
      @HackeXPlorer  4 года назад

      Sure I would love to cover this topic

  • @ausmanx1161
    @ausmanx1161 3 года назад

    Great video
    Just wondering, when saving those malicious files, while it infect your computer or does it only do that when you run the files

  • @youaregod2382
    @youaregod2382 5 лет назад +1

    Hi sir how can we find malware / virus in our Network? the viruses are being cleaned and block by our antivirus,but it's coming back again and again,where do we look to find who is sending or causing alert in our networks and endpoints?

    • @HackeXPlorer
      @HackeXPlorer  4 года назад

      Check i you have any network share that has an infected files. if you send me the virus name i might be able to help you.

  • @adrianpabloalvarez2523
    @adrianpabloalvarez2523 2 года назад

    When selected "export objects" the options (DICOM, HTTP, etc) are greyed (not available).
    Why?

    • @HackeXPlorer
      @HackeXPlorer  2 года назад

      Did you use the same sample file mentioned here?

  • @nandorbacso4625
    @nandorbacso4625 2 года назад

    Hey, great video, but I got stuck at some point:
    For me, all the options under File/Export Objects are grey. Should I select something or is there anything I am missing? Thanks!

    • @HackeXPlorer
      @HackeXPlorer  2 года назад

      If you have a http traffic capture, try typing "http" as a filter, then select a packet .
      Then check the export object option

  • @meeraramanujam3665
    @meeraramanujam3665 2 года назад

    Thank you🙏🏼

  • @humanrelations3664
    @humanrelations3664 3 года назад

    Thanks for the video !!!

  • @gurpreet4449
    @gurpreet4449 3 года назад

    I guess this video is helpful only for HTTP traffic. Most of the websites we visit are HTTPS. How can we do malware analysis for the TLS/HTTPS traffic ? Thank you.