As I don’t know what I don’t know, please just continue this series. It’s great content and Chris really knows how to “sell” his knowledge. Big “thank you!” to both of you!
After using Wireshark and NMAP for 15 years, I am absolutely floored that I have never thought to combine them as a learning tool. OUTSTANDING content here gentlemen. Thank you.
I am a cybersecurity major, and this semester we are using nmap and wireshark a lot. I have an intrusion detection class and studying CySa+, and I found this very helpful. Thank you for all of your content. It’s so valuable to me.
What humble, sophisticated, immensely sane and intellect you both are. You guys are contributing to knowledge so much so that you will be remembered for centuries. Thanks for all your videos and teaching.🙌🙏🙏🙏
I been trying to wrap my head around this stuff for years. You 2 really break this down extremely well for noobs, and people that need respectfully re-educated(referring to myself). Thank you 👏
Please continue this series. What a great series. I have learned a lot from your videos. It is always nice to watch an expert using the tool and explain it.
Great stuff! Chris is the master at Wireshark, and David, I go to you for almost everything else in cybersecurity. Keep up the great work. So educational.
So I searched RUclips for "nmap"; saw your video and thought, "there's one of my go to's". I went from learning a little bit `about nmap and a bunch about Wireshark. I am not at all mad about it. This was a really good video. Soon as I'm done with this comment, I'm going to see if i can find a channel for Chris, or at least bookmark his site.
Thank you for this amazing video! The presentation was amazing & very enjoyable! Also, I use Proxychains with the nmap command. Even though it costs you some extra time, it adds an extra layer of safety!
Always great video as usual! I'd like to learn more how wireshark can show traffic generated by games and other socially active connections. Thanks for the fantastic content.
Guys, this is great content. I watched the last video with Chris on Wireshark and learnt loads, same again here. I never knew there was so much to Wireshark. I’m starting out in this area and find it really informative. I have played around with NMAP a little but would be good to see other videos showing the NMAP vuln scans, NSE too, what finding suspicious behaviour to look out for with RDP or Exchange servers, (RDP accounts for nearly half of ransomware incidents)?
Thank You David. Watching you, Chris here, guys like Occupy the Web, keep me motivated. I am on my learning path, it s not a easy job to become a security expert. But You guys are doing a awesome job for people like us. ❤
I could get a carafe of coffee and have it refilled all day and listen to you and Chris. I've used Wireshark a little in my 20+ year IT career, and I want to dive deeper into it. I'm going through his videos on his channel as well, while trying to get a couple of certifications under my belt. :)
Fantastic video Chris and David! Cheers Chris for going into Wireshark too, that's really useful, and I learned a lot! Awesome to see nmap has 'sections', it reminds me of the different chains that iptables has, and how you can create your own chains.
Make more videos like this to explain some important tools on kali. And the next step after i check for vulnerabilities how I will use them to hack a network or a system. Very helpful video🔥🔥🔥
Man alive. It is just too hard to pass up a David Bombal video. The best! Thank you, David! It's just funny. I try to think when I first started watching your videos... I want to say your networking videos. And motivational videos are so ABSOLUTELY amazing!!! Yeah... It's been some time. I think life was much different then. Calm before the storm in my life and then we all saw the world go crazy. It's as though as Scriptures say, When I thought upon these things, it was too painful for me.... It's just now I realize it, trying to place you. Tears in many bottles, David. You're a dear man if I use you as a clock and calendar. I'm grateful for every video. Thank you so much.
Being the only user of my network, I couldn't figure out why RUclips would be buffering so I ran a packet capture saw a bunch of crazy traffic but had no idea what it meant. After watching a few in this series I've realized for some reason my Google home mini is editing the HTML on my router and for some reason I'm talking to Russia a lot. Moscow even. I'd love to share the .pcap if anyone is interested, and/or could offer some advice. Thanks bunches for what you do, love your channel!
I'll leave another comment to make a suggestion. I think it helps everyone to start with a problem and look at the overall plan of attack to troubleshoot said problem, then what tools you need to dig deeper. e.g. one of my wireless ap's is still broadcasting but there seems to be no internet access behind it. e.g. #2 accessing my NAS occasionally is super slow or is inaccessible. Some people will show you , 'this is wireshark' and then go through every function of it and you get zoned out and wonder when this would come into play. So in this, the gold nuggets are when chris is explaining that in a scenario he will look for something specific by filtering and then breaking down stuff like what the conversation completeness number means.
Hah! I also fire up Wireshark to learn what networking protocols are doing, and when I start an app what it does on the network. I love looking at packets, it is my starting point a lot of the time.
Great video great explanation. Thanks a lot for both of you, right to the point. I would kindly ask you to make a course about C&C traffic and how to recognize it through Wireshark, what are the most important things and what we need to pay attention to in Wireshark etc. I am sure you can do it :). Thank you again!
I agree that ppl should know what's happening on the wire... And using Wireshark is the best way to learn that. I also like the concept of "capture smartly." That makes a lot of sense to me, cuz if it don't have ALL the data, you can't realty trust any... but then you have to have a way of ingesting it... So, break it into smaller bites! (or bytes |:>D ). Good stuff.
Ugh, did a small Nmap scan of my neighbours wifi, to try out NMAP this summer and got an SMS from the internet provider telling peeps in my street to reset our routers. Just scanning for ports seems so innoccent but in some countries it can be a crime so be careful.
I would like to see fingerprints of common host issues in network traces. Slow disks, slow cpu, slow cache, whatever. Also I highly recommend "Silence On The Wire" by Michal Zalewski, super cool stuff.
I would like to understand the attacking methods more as i dont know what im looking for. That said i think you did it here 😄 scanning, how it works, how it will show up, what to look for. So keep this going! Maybe man in the middle next? Great content👍
Regarding the half open TCP sessions, I've also heard them referred to as embryonic TCP sessions. Hopefully this will help others if seeing that term in another context.
Hello David and Chris, thanks a lot for this tutorial. In fact it is awsome to click an icon to set a marker "it happened". What do you think about this to find a slow network action when you click a start of action icon (set start marker) the do your stuff and click an end of action icon (set end marker). It sounds awsome to me to get exactly the small snippet of data. Great Job David and Chris. A customer complained long waiting time to attach a 10 meg file to an outlook email. This strategy can give you exactly the pice of data to search in. Now I have a better strategy to search!
As I don’t know what I don’t know, please just continue this series. It’s great content and Chris really knows how to “sell” his knowledge. Big “thank you!” to both of you!
how about now, one year later, do you still don't know what you don't know?
After using Wireshark and NMAP for 15 years, I am absolutely floored that I have never thought to combine them as a learning tool. OUTSTANDING content here gentlemen. Thank you.
Great to hear Richard! None of us are too old to learn something new :)
and i didnt know about the drag and drop filter ...ouch
That’s what most people do, they can’t think outside of the box.
I am a cybersecurity major, and this semester we are using nmap and wireshark a lot. I have an intrusion detection class and studying CySa+, and I found this very helpful. Thank you for all of your content. It’s so valuable to me.
ive been learning this stuff for 6 years this is the first time i feel like i really understand wireshark! thanks!
Nice hands on skilled learning, exceptional content! Keep up the good work and look forward to the continuation as mentioned!
Thank you! Appreciate that! Lots more content coming soon :)
What humble, sophisticated, immensely sane and intellect you both are. You guys are contributing to knowledge so much so that you will be remembered for centuries. Thanks for all your videos and teaching.🙌🙏🙏🙏
I work in a NOC and can't tell you how useful and applicable this is for me!
This TCP completeness was a new thing for me I had not thought about before. Kudos to Chris for showing this.
Thank you so much David and Chris for the great content you are providing to your audiences. Please keep this series rolling.
Ive been using Wireshark since it's inception, but I've never seen anyone this good at it. Learned a lot here. Great video!
Thank you so much David and Chris! Nice explanation and amazing video, I learned so much. Waiting for the upcoming stuff!
Glad you enjoyed it!
I'm learning Nmap right now for my Cyber security course. Couldn't have timed it better!
What course are you doing?
I been trying to wrap my head around this stuff for years. You 2 really break this down extremely well for noobs, and people that need respectfully re-educated(referring to myself). Thank you 👏
Please continue this series. What a great series. I have learned a lot from your videos. It is always nice to watch an expert using the tool and explain it.
Great stuff! Chris is the master at Wireshark, and David, I go to you for almost everything else in cybersecurity. Keep up the great work. So educational.
Yes this video is very help ful for people who want to learn about cyber security and for us who already in this field. Keep it up David 💕
It's Friday 🌃, and I am watching this as if it were a movie. So entertaining and educational at the same time. This is real on-demand TV😍😍😍
So I searched RUclips for "nmap"; saw your video and thought, "there's one of my go to's". I went from learning a little bit `about nmap and a bunch about Wireshark. I am not at all mad about it. This was a really good video. Soon as I'm done with this comment, I'm going to see if i can find a channel for Chris, or at least bookmark his site.
Freaking KNowledgable , as a Fresher even the concept on how this works together chris nailed it for me , as it opens a new persepctive!!
Thank you for this fascinating video. Look forward to watching more like this!
Thank you David and Chris for this amazing content.
Came to find a piece of information but after starting it took me to the end
Very informative content really helpful
This is OUTSTANDING!!!! Thank you for share this knowledge!
Thank you for this amazing video! The presentation was amazing & very enjoyable!
Also, I use Proxychains with the nmap command. Even though it costs you some extra time, it adds an extra layer of safety!
Always great video as usual! I'd like to learn more how wireshark can show traffic generated by games and other socially active connections. Thanks for the fantastic content.
Thanks David. Chis is awesome! Please continue to have him on the channel.I love learning new things and keep up the great content! 👍
Thanks a lot, waiting for more :) , nmap and wireshark are very important not only for cybersecurity but also for network and systems Engineer
Guys, this is great content. I watched the last video with Chris on Wireshark and learnt loads, same again here. I never knew there was so much to Wireshark. I’m starting out in this area and find it really informative.
I have played around with NMAP a little but would be good to see other videos showing the NMAP vuln scans, NSE too, what finding suspicious behaviour to look out for with RDP or Exchange servers, (RDP accounts for nearly half of ransomware incidents)?
Thank You David. Watching you, Chris here, guys like Occupy the Web, keep me motivated. I am on my learning path, it s not a easy job to become a security expert. But You guys are doing a awesome job for people like us. ❤
Really Appreciate This Sort Of Content On RUclips
That was really helpful and I will certainly apply theses techniques in real life situations, thanks to both of you.
Just bought your course. I am sure it will be well worth it already.
As a student of cyber security I learned so much from this video thank you so much
A great topic! Thanks Chris and David :)
Cheers Guy's ! That was Brilliant. Please do create more of this stuff, Cheers,
I like the videos you've done/been doing with Chris on nmap, pcap's, etc..
Thank you...& please keep 'em comin!
Chris is superman of packet capture. Keep giving us insights into the world of apparently infinite stream of packets.,🙏
Thank you for all of the training you have given me
This was definitely valuable, thank you for sharing guys.
Damn Chris, you're one hell of a man. You earned a lifelong fan here. Please do a video on TLS decryption together. Kudos to David.
They won’t communicate if, otherwise connection wise, basic stuffs we always forget, thanks both sirs.
I could get a carafe of coffee and have it refilled all day and listen to you and Chris. I've used Wireshark a little in my 20+ year IT career, and I want to dive deeper into it. I'm going through his videos on his channel as well, while trying to get a couple of certifications under my belt. :)
Awesome Dwayne! Go get it! Hope the protocol deep dives help you crush those certifications.
@@ChrisGreer Thank you sir, I'm really loving these deep dives!
Very helpful video on network capture techniques!!
man, wow !!! Chris Greer's added to my list of idols.
Did my WCNA in 2010/2011 timeframe but didn’t know about “dumpcap”. And great tip on the Iota tap. Sweet vid and keep up the great work!
Fantastic video Chris and David! Cheers Chris for going into Wireshark too, that's really useful, and I learned a lot!
Awesome to see nmap has 'sections', it reminds me of the different chains that iptables has, and how you can create your own chains.
Make more videos like this to explain some important tools on kali. And the next step after i check for vulnerabilities how I will use them to hack a network or a system.
Very helpful video🔥🔥🔥
Wow priceless information guys , thank you very much for sharing . I went ahead and bought some of the courses to learn more.
I learned so much here. Thank you guys.
Wow amazing coverage of nmap and deep dive!
Thank you so much!
Great to see you guys again together i am going through my CEH studies too and both of your channels are really helping. Bless 🙏
Information at every second 💯
Chris always explains these things so well. Thank you for this great content
i love this, thank you, i was sad the video was over, i didn't see the time go by !
Another great video with so much to learn, thanks David and Chris
that was exactly what I needed , thank you so much
I enjoy david's videos and I'm currently combining Algotrading with Cybersecurity. And it helps that I am a Gman in NoVa.
Generally in production environment nmap is disabled in Linux servers. But this session is really knowledgeable. Thank you so much David.
I'm doing your wireshark course on udemy. This video is a great addition to this course. Thank you!
Phenomenal content. Just starting out but if I ever make it into the field I will not forget this channel
Thank you!
Thank you David for keeping updated for us.
You're welcome!
Man, this is crazy informative. These deep dives with David and Chris are some of the best help out there.
Man alive. It is just too hard to pass up a David Bombal video. The best! Thank you, David!
It's just funny. I try to think when I first started watching your videos... I want to say your networking videos. And motivational videos are so ABSOLUTELY amazing!!! Yeah... It's been some time. I think life was much different then. Calm before the storm in my life and then we all saw the world go crazy. It's as though as Scriptures say, When I thought upon these things, it was too painful for me.... It's just now I realize it, trying to place you. Tears in many bottles, David. You're a dear man if I use you as a clock and calendar. I'm grateful for every video. Thank you so much.
David this is brilliant i love it, mixing 2 great guys and show excellent content. Keep going with this kind of videos.
Thank you Marcelo! Hoping to create a lot more videos with Chris!
Really amazing stuff learned... keep this up !
Being the only user of my network, I couldn't figure out why RUclips would be buffering so I ran a packet capture saw a bunch of crazy traffic but had no idea what it meant. After watching a few in this series I've realized for some reason my Google home mini is editing the HTML on my router and for some reason I'm talking to Russia a lot. Moscow even. I'd love to share the .pcap if anyone is interested, and/or could offer some advice. Thanks bunches for what you do, love your channel!
I have started in this beautiful world of content on RUclips, I am new to this and here we go with issues of cybersecurity and ethical hacking
Great video david.. Thanks Chris for your knowledge, you have taken the learning to next level.. :)
I'll leave another comment to make a suggestion. I think it helps everyone to start with a problem and look at the overall plan of attack to troubleshoot said problem, then what tools you need to dig deeper. e.g. one of my wireless ap's is still broadcasting but there seems to be no internet access behind it. e.g. #2 accessing my NAS occasionally is super slow or is inaccessible.
Some people will show you , 'this is wireshark' and then go through every function of it and you get zoned out and wonder when this would come into play. So in this, the gold nuggets are when chris is explaining that in a scenario he will look for something specific by filtering and then breaking down stuff like what the conversation completeness number means.
I like this. Good suggestion on scenario based analysis rather than feature based analysis. Thanks for the comment and stored for the future!
This was brilliant, I love it!
Thank you for this available content. Actually, I learned a lot by following your channel. Thank you again
Hah! I also fire up Wireshark to learn what networking protocols are doing, and when I start an app what it does on the network. I love looking at packets, it is my starting point a lot of the time.
Nse really opens up what it can do :)
Great video great explanation. Thanks a lot for both of you, right to the point. I would kindly ask you to make a course about C&C traffic and how to recognize it through Wireshark, what are the most important things and what we need to pay attention to in Wireshark etc. I am sure you can do it :). Thank you again!
40:30 - Brilliant, free, and effective bookmark, timestamp, flag ! That's a DUH moment.
Great content, learned quite a lot and appreciate the sharing of knowledge. Looking forward for more content on this subject.
excellent. thank you guys. really appreciate the effort.
I agree that ppl should know what's happening on the wire... And using Wireshark is the best way to learn that.
I also like the concept of "capture smartly." That makes a lot of sense to me, cuz if it don't have ALL the data, you can't realty trust any... but then you have to have a way of ingesting it... So, break it into smaller bites! (or bytes |:>D ). Good stuff.
Another great Collab!
Ugh, did a small Nmap scan of my neighbours wifi, to try out NMAP this summer and got an SMS from the internet provider telling peeps in my street to reset our routers. Just scanning for ports seems so innoccent but in some countries it can be a crime so be careful.
I would like to see fingerprints of common host issues in network traces. Slow disks, slow cpu, slow cache, whatever. Also I highly recommend "Silence On The Wire" by Michal Zalewski, super cool stuff.
TCP Flags can be combined, the meaning of "Flags" is that multiple bits can be set.
I love how agressive you were being about getting him to open Nmap😂😂😂
I would like to understand the attacking methods more as i dont know what im looking for. That said i think you did it here 😄 scanning, how it works, how it will show up, what to look for. So keep this going! Maybe man in the middle next? Great content👍
Thanks for that episode, helpful and interesting
Glad you enjoyed it
Regarding the half open TCP sessions, I've also heard them referred to as embryonic TCP sessions. Hopefully this will help others if seeing that term in another context.
Your hacking series is God's work sir!
Great talk thank you both ...
+100 for properly pronouncing `sudo` AKA `Super User Do`
Brilliant! Capture smart.
Chris is the packet whisperer wow
Great Session guys!
Amazing content. Thanks a lot!
Thanks for the knowledge
What incredible content. Thanks for this!!!
David looks like he already know this stuff 😂😂😂😂
Continue it please its good to know how things goes
Thank you for this I learn from this
Keep it coming. Great. Video.
Thanks! Will do!
Hello David and Chris,
thanks a lot for this tutorial. In fact it is awsome to click an icon to set a marker "it happened".
What do you think about this to find a slow network action when you click a start of action icon (set start marker) the do your stuff and click an end of action icon (set end marker). It sounds awsome to me to get exactly the small snippet of data. Great Job David and Chris. A customer complained long waiting time to attach a 10 meg file to an outlook email. This strategy can give you exactly the pice of data to search in. Now I have a better strategy to search!