Top 5 Wireshark tricks to troubleshoot SLOW networks

Поделиться
HTML-код
  • Опубликовано: 21 сен 2024

Комментарии • 163

  • @davidbombal
    @davidbombal  6 месяцев назад +12

    Big thank you to Proton for sponsoring this video. Get Proton VPN using my link: davidbombal.wiki/protonvpn2
    // Chris’ SOCIAL //
    LinkedIn: www.linkedin.com/in/cgreer/
    RUclips: ruclips.net/user/ChrisGreer
    X/Twitter: twitter.com/packetpioneer
    // GitHub Link to lab file //
    Packet Pioneer GitHub: github.com/packetpioneer/youtube/blob/main/Lab1-GreerBombal_ItsNotTheNetwork.pcapng
    // RUclips videos REFERENCE //
    Wireshark Tutorial for beginners. Where to start with Wireshark: ruclips.net/video/OU-A2EmVrKQ/видео.html
    // RUclips PLAYLIST //
    Wireshark with Chris Greer: ruclips.net/video/rmFX1V49K8U/видео.html&pp=iAQB
    // David SOCIAL //
    Discord: discord.com/invite/usKSyzb
    X: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    RUclips: www.youtube.com/@davidbombal
    // MY STUFF //
    www.amazon.com/shop/davidbombal
    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended.
    Thank you for supporting me and this channel!
    Disclaimer: This video is for educational purposes only.

    • @harrylumsdon6773
      @harrylumsdon6773 6 месяцев назад +1

      Old days. Fluke optiview, and iperf.

  • @aliabbas48
    @aliabbas48 6 месяцев назад +11

    29:10 I spent a lot of time earlier to understand that why I am getting huge value in segment length column although MTU is set 1500. Thank you Chris for going to different tangents; it helps a lot! Thank you David for bringing such valueable persons on your channel!

    • @ChrisGreer
      @ChrisGreer 6 месяцев назад

      Yeah that is a tricky one!

  • @jjdope92
    @jjdope92 6 месяцев назад +11

    A very big thank you to both of you. You guys are literally changing the way I look into network issues and I am becoming better and better each day. Keep up the beyond-excellent work.

  • @BrokenKanuck
    @BrokenKanuck 6 месяцев назад +4

    Wasn't expecting to watch this end to end, - but damn, enthralled. Love this stuff!

  • @Mike.Kachar
    @Mike.Kachar 6 месяцев назад +9

    I ❤ the videos you do with Chris Greer.
    The info he provides about Wireshark & what you're looking at + for within pcap's is something, I feel, today every network'er should know how to do & what to look for.
    👍👍👌

  • @zchantzis
    @zchantzis 6 месяцев назад +13

    David & Chris you are opening our eyes 👀. Thank you 🙏

    • @davidbombal
      @davidbombal  6 месяцев назад

      Happy to hear that! You're welcome!

  • @ken_tx
    @ken_tx 6 месяцев назад +5

    Chris is a great mentor. His knowledge, personality and demeanor lend himself to being great. Always enjoy his content, thanks for hosting him.

    • @ChrisGreer
      @ChrisGreer 6 месяцев назад +1

      Thanks for the comment! I really enjoy coming on and chatting with david.

    • @Lovely_planet
      @Lovely_planet 6 месяцев назад

      Couldn’t have said it better

  • @TomWhi
    @TomWhi 6 месяцев назад +2

    Ironically talking about the slow passage of time between packets, but at the same time this video was over before I knew it! Fantastic explanation as always, and lovely to see you again as a guest, Chris.

  • @dingokidneys
    @dingokidneys 6 месяцев назад +2

    These are always fascinating and as for the digressions, I'm OK with them because you always come back to the point you digressed from but have also imparted some breadth to the discussion. I could always jump ahead in any case if I found them unhelpful.

  • @wadebrumbaugh7579
    @wadebrumbaugh7579 6 месяцев назад +2

    I ❤ the detailed tangents. In this case (29 min mark), it helped me understand where in the process the capture actually happens and why they show larger than 1500. Keep the details coming.

  • @chrismoore1981
    @chrismoore1981 6 месяцев назад +3

    Thanks Chris/David. Chris I love more detail than less detail when explaining different things.

  • @apeironMEG
    @apeironMEG 6 месяцев назад +2

    Hey Chris don't listen anybody and give us that details please. Those kind of knowledges are necessary when you try to give a logic to processes. Thank you David, awesome again. Appreciate it.

  • @kovi17
    @kovi17 6 месяцев назад +4

    No lies, the detailed tangents really help expand on the why of it for me. Great video guys!

    • @ChrisGreer
      @ChrisGreer 6 месяцев назад +2

      Thanks for the feedback. I love getting to the point, but so much is lost when you do that.

    • @kovi17
      @kovi17 6 месяцев назад +1

      @@ChrisGreer Absolutely! I’ve just started transitioning to an IT based career and earned the A+ certification and working on security+. Every time you expanded upon the point you were making it definitely helped me understand things better. Thanks for your content, and I absolutely subscribed to your channel!

  • @Nicksegura-s1c
    @Nicksegura-s1c 2 месяца назад

    I love the real world tangents, especially if they are heavily technically based. Much love, and thank you for the wealth of information.

  • @Tech-wise-
    @Tech-wise- 6 месяцев назад +1

    Thanks Chris Greer and David Bombal.
    Getting in detail is actually good as it further clears the concept of what is behind the stuff you're imparting.

  • @jgl1563
    @jgl1563 6 месяцев назад +2

    I watch lots of your videos David but damn!!... this has been one of my favorites by far.
    Please we need more content like this 🙏🏼🙏🏼🙏🏼

  • @karanb2067
    @karanb2067 6 месяцев назад +2

    I once used the skills Chris taught to analyze an LNK file attack, showed me how beautiful that attack was...

  • @marvelousekpenyong4343
    @marvelousekpenyong4343 6 месяцев назад +1

    great work David and Chris. I love your contents. I'm someone looking for breakthrough in Wireshark packet analysis. I feel Chris' channel is just the right place for me. Love from Nigeria. Keep up the good work. Thank you so much David. Looking forward to more sessions like this with you and chris

  • @KeithPawson
    @KeithPawson 6 месяцев назад +1

    This is brilliant, I have another bookmarked video! Digressing is fine and works for me, Chris adds value to the subject when he does this. Even in 2024 the basic fundamentals of TCP are essential, just wish I had more time to spend in this area.

  • @johnblixt4740
    @johnblixt4740 6 месяцев назад +1

    Love the details and tangents because it helps me understand more of the big picture. Awesome content and I'm going to get lost in your channel, Chris. Thanks both!

  • @BlaMM74
    @BlaMM74 6 месяцев назад +1

    This is very timely, I'm dealing with network issues right now!

  • @vincentio1060
    @vincentio1060 5 месяцев назад

    This channel is a goldmine for aspiring networking/cyber security professionals

  • @raymation3d
    @raymation3d 6 месяцев назад +1

    Chris I love your side bars and detailed tangents little buddy absolute gold!

  • @Maxშემიწყალე
    @Maxშემიწყალე 6 месяцев назад

    I bought this dudes Wireshark course on Udemy; very solid. Would recommend for anyone in IT to take it. Thank you David for having this dude on.

  • @breakingbisley
    @breakingbisley 5 месяцев назад

    Great video! If you 're TSing issues regarding Window Size and Packet Loss (to double-check if the TCP window size is not getting slammed on the receiver, and on the very rare occasion vice versa). select under 'Statistics - TCP Stream Graphs - Window Scaling', this a good tool to measure and view the respective Window scaling between C/S and S/C. I think Chris made a video of it years ago! I hope this helps :)

  • @secinject814
    @secinject814 6 месяцев назад

    Good to hear an ad for a VPN that's really just about what it's main function is, which is
    encrypting traffic. You can build one at home with a raspberry pi if you can find one, you just wont have the geolocation hopping. It is just a good first line of defense against attacks, as letting people know your IP can let them possibly wreak havoc on your device.

  • @takistmr
    @takistmr 6 месяцев назад +1

    Great content, as always David and Chris! I will stay on one point: "...let's buy training instead of a lot of equipment!"

  • @serxhioshani3862
    @serxhioshani3862 6 месяцев назад +1

    Much appreciations guys! Patiently waiting for that SACK video

    • @ChrisGreer
      @ChrisGreer 6 месяцев назад +1

      This is a great idea.

  • @EWCRC
    @EWCRC 6 месяцев назад +2

    Always enjoy a good detailed tangent.

  • @psypherpro
    @psypherpro 2 месяца назад

    For me the way Chris explain it is so excellent and informative.

  • @dandele123
    @dandele123 6 месяцев назад +1

    More Chris Greer videos! His content is awesome. Post more on your own channel Chris!

    • @ChrisGreer
      @ChrisGreer 6 месяцев назад +1

      I know… 😆 thanks for calling me out!

  • @rap1z
    @rap1z 6 месяцев назад

    I love chris, hes always trying to just teach us stuff but like actually without peddling shitloads of courses and shit

  • @scottspa74
    @scottspa74 6 месяцев назад

    I love when you have chris on. I bought tye course he did with wireshark and nmap, just havent had time to start it, yet. Busy with ccna study and tls study with Ed Harmoush. When chris goes 'on tangents' it's an excellent learning opportunity. Would gave liked a bit more on the relationship between segment size and window size in tcp. Would also like to see more about QUIC. Thanks.

  • @tgrav3
    @tgrav3 6 месяцев назад +2

    This is so awesome!
    @Chris, I support the detailed tangents!

    • @davidbombal
      @davidbombal  6 месяцев назад

      Glad you enjoyed the video!

  • @trainwreck1827
    @trainwreck1827 6 месяцев назад

    What a G! Thanks for introducing me to this guy. I've been using WS for years and it's nice to pick up some new tricks.

    • @davidbombal
      @davidbombal  6 месяцев назад

      You're welcome! Chris is the person to follow if you want to learn about Wireshark.

  • @NetworkNinja111
    @NetworkNinja111 6 месяцев назад +1

    Great video!! I do like when he gets straight to the point though. The tangents throw me off cause I lose focus. When he gets straight to the point I feel like gain so much knowledge and light bulbs start going off. Thanks again for this amazing content!!

    • @ChrisGreer
      @ChrisGreer 6 месяцев назад

      That is great feedback, thank you!

  • @OurSpaceshipEarth
    @OurSpaceshipEarth 6 месяцев назад +1

    "Ya I had 'er, and all I got was.. EVERYTHING!" Low level? Well I did turn on my physical connector's Promiscuous mode! Rocked that Packet Capture all night! After all; "PCAPs or it's fake!".

  • @TheChad17
    @TheChad17 6 месяцев назад +2

    Great work. Your videos keep me entertained and interested. Thank you again.

  • @gamereditor59ner22
    @gamereditor59ner22 6 месяцев назад +1

    That's cool! Thank you for the tricks!! I will use wireshark to understand in depth of packets!

  • @anuragvashishth1564
    @anuragvashishth1564 3 месяца назад

    Fantastic Chris for the wonderful troubleshooting session.

  • @ignacioserrano7295
    @ignacioserrano7295 Месяц назад

    Thank you very much for the video you made; I learn a lot!

  • @diptiranjansahoo5278
    @diptiranjansahoo5278 6 месяцев назад +1

    Hey David and Chris,
    You both are awesome. Thanks for all these videos.
    Chris, you are looking cool with your new beard style 😊..

  • @pcap_pirate960
    @pcap_pirate960 6 месяцев назад

    Hands on is the Best way to learn, build home labs small or large testing stuff on that and watching what it does is when you can really grasp this stuff.

  • @Traumatree
    @Traumatree 6 месяцев назад

    If you had mention VirtualBox at the beginning, I wouldn't even need to check the pcap lol
    Great video guys thx!

  • @jonathantx
    @jonathantx 4 месяца назад

    Like always this content with chris is spot on and awesome. BTW tangents are awesome, they help out a bunch.👍, I wish I could give these videos more than 1 thumbs up LOL

  • @Cole987Turner
    @Cole987Turner 6 месяцев назад

    Thanks to you both for this video!!! Had a problem, which seems to be a very similiar to this and I used your technique to troubleshoot! Thank you very much!! :)

  • @pmanolak
    @pmanolak 6 месяцев назад

    Brilliant video as usual. David and Chris are so sweet persons and have the ability to pass their knowledge. and that's make the difference!! You can be a great scientist, but if you dont have the ability to spread your knowledge, you cant be a good teacher.

  • @MuhammadUsman-xx2ef
    @MuhammadUsman-xx2ef 6 месяцев назад

    Really fantastic video and good to see Chris x David again. David please invite Neal Bridges again and talk about Cybersecurity and how AI is shifting the paradigms of the Cybersecurity
    Thanks and Love from Pakistan ❤

  • @joechen9498
    @joechen9498 6 месяцев назад

    Thank you guys. you made packet analysis interesting. Definitely checking on Chris's channel and learn more about Wireshark.

  • @georgecherogiorgos4820
    @georgecherogiorgos4820 5 месяцев назад

    Great stuff! Really enjoyed Chris' analysis! Keep 'em coming!

  • @MyDancingirl
    @MyDancingirl 6 месяцев назад

    Great interview and tutorial! Many helpful insights 💎

  • @Abduselam.m
    @Abduselam.m 6 месяцев назад +1

    David thanks you can improve my education

  • @stardavos
    @stardavos 6 месяцев назад +7

    Keep on tangenting. Thats what they made 1.5x speed for

  • @whosonedphone
    @whosonedphone 6 месяцев назад +1

    Love the detailed tangents. Would like to know what the window size is.

  • @anonymousperson45152
    @anonymousperson45152 6 месяцев назад

    Really enjoyed video! Thanks for both of you guys for these informative content.

  • @RadAlzyoud
    @RadAlzyoud 6 месяцев назад

    Brilliant.
    And Chris, you got yourself a new subscriber.
    Thx for sharing both.

  • @ged4440
    @ged4440 6 месяцев назад

    On all of the web, you guys are the best!

  • @OurSpaceshipEarth
    @OurSpaceshipEarth 6 месяцев назад +2

    Best Wireshark Howto EVER. +bonus TCP SYN ACK analysis, hit _that_ spot by bringing out an RFC reference. So dope good content man tangent detail Approved [ACK]. =:r[]

  • @feiwoza
    @feiwoza 6 месяцев назад

    Chris you look better with the beard :) - thank you David and Chris for this ...

  • @nawlaynawlay4722
    @nawlaynawlay4722 6 месяцев назад

    Thank you for sharing your knowledge and experience.

  • @A..n..d..y
    @A..n..d..y 6 месяцев назад

    I really enjoy this. Wireshark is such an important tool.

  • @heraldbygrace
    @heraldbygrace 6 месяцев назад

    Thanks Chris and David!!!
    This seems like a murder mystery thriller movie to me. lol. 🤣🤣🤣

  • @LiquidShepard
    @LiquidShepard 6 месяцев назад

    Love youre content David, ure my example of a hero!

  • @stylis666
    @stylis666 6 месяцев назад

    I really like it, a lot! You know, those detailed tangents.
    An explanation of how an application works and what you can use it for is nice, but if you skip those tangents, I will not know why everything I see is or behaves just slightly different from what you're explaining. I'd have to look up every single detail that you explain in those tangents.
    But if you have physical access to the network, can't you then just hook up to the wire that is going into your modem or coming out of your modem to see what packages are sent from the server?

  • @k_usuan
    @k_usuan 6 месяцев назад

    Great content and bravo! And oh your video editing is top top 🔥

  • @mikkio5371
    @mikkio5371 6 месяцев назад

    I enjoy listening to both you guys

  • @cyberdefenseddi
    @cyberdefenseddi 6 месяцев назад

    Enjoyed the content! 😎👊 “it’s always DNS”

  • @mahdihasan42
    @mahdihasan42 19 дней назад

    This person did not invest money on Wireshark, but he owns it.

  • @S0U1SB4N3.
    @S0U1SB4N3. 5 месяцев назад

    yes please share details and rabbit trails !

  • @jesperhansen7474
    @jesperhansen7474 6 месяцев назад

    keep it up with the details in wireshark. I need to lean nore :)

  • @karanb2067
    @karanb2067 6 месяцев назад

    Idea for another video : covering active directory authorizations or AD attacks

  • @ctrlaltdel3221
    @ctrlaltdel3221 6 месяцев назад

    Watching now!

  • @ericheydemann9556
    @ericheydemann9556 6 месяцев назад

    Good work out of you both 👍👍👍

  • @jacobhenriksen2324
    @jacobhenriksen2324 6 месяцев назад

    I would love to see how to troubleshoot asymmetric routing that is messing up TCP handshakes, using Wireshark

  • @YusriCassim
    @YusriCassim 6 месяцев назад

    Great learning this morning weekend thank you sir for sharing this tutorial video it’s makes me inspired by this video sir 32:41

  • @joerockhead7246
    @joerockhead7246 6 месяцев назад

    my fav. thanks, david, & chris.

  • @rutgrrr5135
    @rutgrrr5135 6 месяцев назад

    Hey David, love your content.
    But please try to not interrupt your guest when they are talking.
    Thx in advance.

  • @khanabdulmuhammad5625
    @khanabdulmuhammad5625 6 месяцев назад +1

    Chris is Awesome

  • @raghavendrag6152
    @raghavendrag6152 4 месяца назад

    Thanks Chris

  • @majiddehbi9186
    @majiddehbi9186 6 месяцев назад

    Great to see u guys again

  • @alptekinserdenak2263
    @alptekinserdenak2263 6 месяцев назад

    @ChrisGreer Details and circumstances do matter. That's how you will become an expert.

  • @Unique-m4z
    @Unique-m4z 6 месяцев назад

    eagerly waiting for stuff like that from you

  • @rishiraj2548
    @rishiraj2548 6 месяцев назад +1

    Thanks

  • @GeoPeter
    @GeoPeter 6 месяцев назад

    Super valuable video! Thanks!

  • @lakshmanans1681
    @lakshmanans1681 6 месяцев назад +1

    Awesome

  • @abdelkaioumbouaicha
    @abdelkaioumbouaicha 6 месяцев назад

    📝 Summary of Key Points:
    📌 The video discusses troubleshooting network performance issues by analyzing packet captures, focusing on factors like TCP handshake, TCP options, time delays, TCP indicators, and root cause analysis.
    🧐 Detailed examination of TCP handshake, including TCP options like maximum segment size, selective acknowledgment, and window scale, provides insights into network behavior and performance.
    🚀 Analyzing time delays between packets reveals congestion issues, such as TCP zero window, impacting data transfer and causing significant delays in communication.
    💡 Additional Insights and Observations:
    💬 "Packets don't lie" emphasizes the importance of hands-on packet analysis to understand network issues thoroughly and develop effective troubleshooting skills.
    📊 Understanding TCP settings and indicators can help network engineers pinpoint performance bottlenecks and address root causes effectively.
    📣 Concluding Remarks:
    The video highlights the significance of packet analysis in diagnosing network problems, showcasing how TCP settings, delays, and indicators can reveal critical insights for resolving performance issues. By delving into packet captures and interpreting network behavior, professionals can enhance their troubleshooting capabilities and optimize network performance effectively.
    Generated using TalkBud

  • @IrishOverkilled
    @IrishOverkilled 6 месяцев назад +3

    It was over 5 minutes and we weren't in a pcap file... 😮😅

  • @lisa22150
    @lisa22150 5 месяцев назад

    I am feeling dirty for thinking Chris is incredibly hot. But seriously, these videos are amazing and I cannot wait to learn more. You guys make the dull into the fascinating.

  • @sinenomine9143
    @sinenomine9143 6 месяцев назад

    There is one thing I want to know more about. Thats VPN traffic and how a server can ses there is VPN traffic and how to hide the VPN traffic from the server. Perhaps hide your VPN traffic as HTTPS traffic?

  • @notaras1985
    @notaras1985 4 месяца назад

    28:50 what usually causes the segmentation or reassembly issues?

  • @bonfirehost
    @bonfirehost 6 месяцев назад +1

    Just do it ❤

    • @davidbombal
      @davidbombal  6 месяцев назад

      I hope you enjoy the video :)

  • @magpieenterprise6781
    @magpieenterprise6781 5 дней назад

    Hi Chris or Dave: At 32:39 you say we are dealing with two 1460s but I see 14060. Can you clarify this for me? How is 14060 adding up to 2920? Thanks

  • @ikdark512
    @ikdark512 6 месяцев назад

    Amaizing

  • @pinojuanka
    @pinojuanka 6 месяцев назад

    Hello David, greetings from Chile, a query do you know of any book that you recommend that talks about the study of packages?

  • @thmaym4268
    @thmaym4268 3 месяца назад

    Appreciat it

  • @Sudqi55
    @Sudqi55 5 месяцев назад

    why 7 multiply with 128 in window scale is a problem, can you explain please?

  • @alawiabbas9386
    @alawiabbas9386 6 месяцев назад

    I want to start into cyber security, from where should i start

  • @Polandisch
    @Polandisch 6 месяцев назад

    Great video. Thank you.

  • @Zedorek
    @Zedorek 6 месяцев назад

    so what was shaping the packet? which virtual setting on the host was responsible for this?

  • @dc8official
    @dc8official 6 месяцев назад

    Chris got beards now ...... lovely