Hacker hunting with Wireshark (even if SSL encrypted!)

Поделиться
HTML-код
  • Опубликовано: 20 июн 2024
  • The packets don't lie. You can hide processes or logs, but you cannot hide packets. Malware is a major problem in today's networks. Chris Greer is the Wireshark master. He shows us how to use Wireshark to find Malware and suspicious traffic in our networks.
    // PCAP download //
    Get the pcap here: malware-traffic-analysis.net/...
    // Websites mentioned //
    ja3: ja3er.com
    If ja3er doesn't work, try this site: sslbl.abuse.ch/ja3-fingerprints
    Malware Analysis pcaps: malware-traffic-analysis.net
    //CHRIS GREER //
    Wireshark course: davidbombal.wiki/chriswireshark
    Nmap course: davidbombal.wiki/chrisnmap
    LinkedIn: / cgreer
    RUclips: / chrisgreer
    Twitter: / packetpioneer
    // David SOCIAL //
    Discord: / discord
    Twitter: / davidbombal
    Instagram: / davidbombal
    LinkedIn: / davidbombal
    Facebook: / davidbombal.co
    TikTok: / davidbombal
    RUclips: / davidbombal
    // MY STUFF //
    www.amazon.com/shop/davidbombal
    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
    // MENU //
    00:00 - Intro
    04:24 - Sharkfest / DEFCON
    05:55 - What is Threat Hunting?
    07:33 - Why threat hunt with Wireshark?
    10:05 - What are IOCs
    10:30 - Why should we care?
    12:23 - Packets/PCAPs
    18:48 - 'Low hanging fruit'
    21:10 - TCP Stream
    27:29 - Stream
    35:00 - How to know what to look for?
    37:49 - JA3 Client Fingerprint
    41:25 - ja3er.com
    48:08 - Brim
    52:20 - TSHARK
    58:50 - Large Data Example
    01:04:00 - Chris' Course
    01:06:20 - Outro
    malware
    hacking
    hacker
    wireshark
    udp
    http
    https
    quic
    tcp
    firewall
    firewall quic
    quic firewall
    threat hunting
    hack
    hackers
    blue team
    red team
    tshark
    chris greer
    http
    https
    ssl
    nmap
    ja3
    ja3 ssl
    ssl fingerprint
    nmap tutorial
    defcon
    sharkfest,
    acket analysis
    wireshark training
    wireshark tutorial
    free wireshark training
    wireshark tips
    wireshark for beginners
    wireshark analysis
    packet capture
    wireshark tutorial kali linux
    wireshark course
    introduction to wireshark
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
    #malware #hacking #wireshark

Комментарии • 315

  • @davidbombal
    @davidbombal  Год назад +122

    The packets don't lie. You can hide processes or logs, but you cannot hide packets. Malware is a major problem in today's networks. Chris Greer is the Wireshark master. He shows us how to use Wireshark to find Malware and suspicious traffic in our networks.
    // MENU //
    00:26 - Intro
    04:24 - Sharkfest / DEFCON
    05:55 - What is Threat Hunting?
    07:33 - Why threat hunt with Wireshark?
    10:05 - What are IOCs
    10:30 - Why should we care?
    12:23 - Packets/PCAPs
    18:48 - 'Low hanging fruit'
    21:10 - TCP Stream
    27:29 - Stream
    35:00 - How to know what to look for?
    37:49 - JA3 Client Fingerprint
    41:25 - ja3er.com
    48:08 - Brim
    52:20 - TSHARK
    58:50 - Large Data Example
    01:04:00 - Chris' Course
    01:06:20 - Outro
    // PCAP download //
    Get the pcap here: malware-traffic-analysis.net/2020/05/28/index.html
    // Websites mentioned //
    ja3: ja3er.com
    Malware Analysis pcaps: malware-traffic-analysis.net
    //CHRIS GREER //
    Udemy course: davidbombal.wiki/chriswireshark
    LinkedIn: www.linkedin.com/in/cgreer/
    RUclips: ruclips.net/user/ChrisGreer
    Twitter: twitter.com/packetpioneer
    // David SOCIAL //
    Discord: discord.com/invite/usKSyzb
    Twitter: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    RUclips: ruclips.net/user/davidbombal
    // MY STUFF //
    www.amazon.com/shop/davidbombal
    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

    • @Twdsheikh2931
      @Twdsheikh2931 Год назад +1

      Please make a video on how to install ubuntu 22.04 with gui in wsl2

    • @Twdsheikh2931
      @Twdsheikh2931 Год назад

      Please make a video on how to install ubuntu 22.04 with gui in wsl2

    • @Twdsheikh2931
      @Twdsheikh2931 Год назад

      Please make a video on how to install ubuntu 22.04 with gui in wsl2

    • @Twdsheikh2931
      @Twdsheikh2931 Год назад

      Love from India
      Please make a video on how to install ubuntu 22.04 with gui in wsl2

    • @Twdsheikh2931
      @Twdsheikh2931 Год назад

      Love from india

  • @ChrisGreer
    @ChrisGreer Год назад +150

    Wireshark is a great threat hunting tool! Had fun digging with David into the packets with this one.

    • @davidbombal
      @davidbombal  Год назад +9

      Thanks so much for sharing your knowledge and experience with us Chris! Looking forward to more and especially the course :)

    • @mrskeptic9957
      @mrskeptic9957 Год назад +4

      @@davidbombal Thank you both for everything you do :)

    • @JohnMandersonBM
      @JohnMandersonBM Год назад +3

      Hey Chris, how do you get endpoints to show country?

    • @ChrisGreer
      @ChrisGreer Год назад

      @@JohnMandersonBM Map IP Address Locations with Wireshark (Using GeoIP)
      ruclips.net/video/IlVppluWTHw/видео.html here is a video of how to do it.

    • @admar-nelson
      @admar-nelson Год назад +1

      Спасибо за урок!! Thanks for lesson!!! Obrigado pela lição. Não tenho palavras!!

  • @francorreaccna
    @francorreaccna 8 месяцев назад +7

    I love how professionals are both the way they talk and kind of complement each other with their personalities

  • @djdawso
    @djdawso Год назад +23

    I know Chris mentioned it a few times, but I think it's worth emphasizing that one of the most powerful skills in all Wireshark analysis is just scanning through a capture file looking for things that seem even a little bit unusual. Pretty much all the other smart Wireshark people, such as Kary Rogers, Jasper Bongertz, Hansang Bae, and Laura Chappell, preach this as well. This is one of the main reasons for just looking at a lot of capture files as Chris also suggests (even just normal traffic), since it gives you the experience to more quickly recognize more things that may be out of the ordinary. Yet another excellent video, David & Chris. Well done!!!
    Also one little note: "sort -u" does the same thing as "sort | uniq"

  • @robtot1934
    @robtot1934 Год назад +14

    David, you have managed to bring so many talented experts to your channel, including your experience accumulated over the years... Thank you for your contribution

  • @Ebi_J
    @Ebi_J Год назад +6

    Thank you David. I find that whether you are the one sharing or a guest, I always leave each video much more knowledgeable and wanting to know more.

  • @verolyn8459
    @verolyn8459 Год назад +9

    David and his friend is giving us another level of knowledge again.

    • @davidbombal
      @davidbombal  Год назад +2

      Thank you Verolyn! Chris is absolutely amazing! Grateful that he is sharing his knowledge with all of us :)

  • @criptovida
    @criptovida 9 месяцев назад +5

    Thanks Chris and David putting this together, really amazing to brush up the packet analysis skills.

  • @rustybolts8953
    @rustybolts8953 Год назад +4

    I am old enough to recall the days when even at MIT, the password was usually "Password" or just hit enter. How far we have come since those days.. This is by far the best anti hacking videos I have seen so far. Thanks David.

  • @billzade8158
    @billzade8158 9 месяцев назад +3

    The more I read and learn about Blue Hatting and Purple Hatting, the more I feel like that is where I want to go. Red Team is super cool, but all the blue team threat hunting stuff is intensely interesting and cool. I know that learning how to Pen Test is a vital part of really building a great defense, I am really excited to keep diving into Cyber Security. I'm going through a Software Development Degree in College, and I am seriously considering adding a Cyber Security minor. Thank you gentlemen for the excellent discussion and lesson

  • @Stuloud
    @Stuloud 10 месяцев назад +2

    Wow, This fascinates me. I have always thought that looking at what your machine or network is sending out is the key to finding whether you are compromised or not. I am an old newbie at this. David your channel ROCKS!

  • @duscraftphoto
    @duscraftphoto Год назад +3

    As always, amazing content from David and Chris. I found this one especially interesting because I’ve been working on writing malware (to see if I can ha ha) and seeing the traffic at the packet level is awesome.
    Keep it up and ROCK ON!

    • @davidbombal
      @davidbombal  Год назад +1

      Thank you! Glad you enjoyed it Dustin :)

  • @jasonb2221
    @jasonb2221 Год назад +4

    Thank you David amd Chris, this was awesome! I don't know about you guys, but I can't wait to see Chris showcase his tshark custom scripts course.

  • @fun_iqp
    @fun_iqp Год назад +4

    I think is absolutely necessary to understand packets in order to prevent new forms of malware, and not just with WireShark, NetScat or tools alike. But having a great knowledge abput network with these kind of tools should be great for counterattack and hunting, so I demand a full master course from this brilliant gentleman so I can put my own blue cap on :)

  • @tjmarx
    @tjmarx Год назад +1

    I like this cut much better than some of your earlier videos. Very frequently these interviews seem to ramble, get a little repetitive and unstructured.
    I really enjoyed how the cut improved that in this video. Whoever the editor is give them a big thumbs up.

  • @joerockhead7246
    @joerockhead7246 Год назад +3

    Thanks, David, & Chris, this was a great episode. I really enjoy when you have Chris on.

    • @davidbombal
      @davidbombal  Год назад +1

      Glad you enjoyed it Joe! Chris is amazing :)

  • @pivot3india
    @pivot3india Год назад +2

    the extent to which we can analyse the packets and go deep inside is making me ready to take the course. thanks for all your efforts.

  • @cryptombt5880
    @cryptombt5880 Год назад +4

    Fantastic video, David. Thanks to Chris also. God, I learnt so much from this video. I'm frequently doing scans on my home network to what is I class as normal traffic etc. Just fantastic video

  • @MrBitviper
    @MrBitviper Год назад +1

    thanks for another insightful video David
    this is an awesome collaboration. hope we'd get to see more

  • @onikira3115
    @onikira3115 Год назад +3

    for some reason Wireshark was never one of the best tool I would have liked to use in the future but now my Perspective in viewing this tool has been far broadened😅 Thanks David and also much thanks to Chris

  • @ronin2167
    @ronin2167 Год назад +4

    I had a short course years ago in Wireshark with Laura Chappell. I have a signed copy of her book. It was an awesome class. She showed us how to set up all sorts of filters for Wireshark, but I never really used it and forgot it all. LOL

    • @davidbombal
      @davidbombal  Год назад +1

      lol... Wireshark gives you a lot of power! Well worth learning how to use it.

  • @Sound_Stable
    @Sound_Stable Год назад +15

    Using Wireshark on your home network will make you want to throw out all of your smart devices. So many apps on your smart devices request things like voice and camera data when they have absolutely no associated functionality or reason to be doing so. It's very alarming.

    • @GuardDog42
      @GuardDog42 Год назад

      Thanks for the heads up dude

  • @oshalabashiya9058
    @oshalabashiya9058 Год назад +1

    I’m 14 minutes in and I’m so stoked that you guys are doing this video. There is nothing I would rather be doing right now. Thanks dudes!

  • @francon9586
    @francon9586 8 месяцев назад +2

    Awesome video. Thanks Chris and David for putting this out there.

  • @SupItsJ
    @SupItsJ Год назад +21

    David, this channel is so underrated. You take real world threats and break them into understandable bits that average users can grasp. Whether or not they believe the threats are actually more common than not is another topic, but trust that this man is peeling back the layers of otherwise invisible crimes that are common. Taking a few easy steps can put off attackers to move on to easier prey, just takes some getting used to getting into new, safer habits.

    • @JonDoe-gi5zf
      @JonDoe-gi5zf 8 месяцев назад +1

      How is it underrated? He has over 2 million subs 😂😂😂

    • @SupItsJ
      @SupItsJ 8 месяцев назад

      Should be 20 million. As an IT security pro and graduate I have seen and attended lots of classes, but the planning in David's content is evident in the presentation and engagements.@@JonDoe-gi5zf

  • @shadowcipher4068
    @shadowcipher4068 9 месяцев назад +3

    Good stuff. This guy Chris Greer is awesome. Thanks, both of you.

  • @mo938
    @mo938 Год назад +5

    Curl is not kernel level…..it’s a command line tool. It’s odd to see bc it’s a web request not coming from a browser.

  • @BobBob-qm2bm
    @BobBob-qm2bm Год назад +29

    Thanks David and Chris for sharing the knowledge and providing relevant content. Wirewatching is real and relevant separating the good beans from those that are bad👨‍💻

    • @davidbombal
      @davidbombal  Год назад

      You're welcome! We can all learn so much from Chris :)

  • @buraksahin7297
    @buraksahin7297 Год назад +2

    Thank you so so much David and Chris. You are the best! Appreciate it :)

  • @upup5133
    @upup5133 Год назад +1

    My man... This is awesome for those who has time to watch... Even for me cuz I can't wait to watch your another video. Content is amazing and I really like it, keep it going David!!!

  • @DirtyChungus
    @DirtyChungus Год назад +3

    Went to a workshop Chris hosted at DefCon 30, it was awesome! Learned so much

  • @TS-jd6rh
    @TS-jd6rh 8 месяцев назад +1

    David's podcasts are always fun, interesting and valuable topic thank you for inspiring to get back to learning about cyber security.

  • @roadkill1896
    @roadkill1896 Год назад +2

    Brilliant video! Wireshark always seems overwhelming and somewhat intimidating to me, this at the very least shows you how you can effectively use it to threat hunt with some simple processes. Well done!

  • @isaacfalero
    @isaacfalero 7 месяцев назад

    The quality of this video is off the charts! Thank you both for your work.

  • @cwain96
    @cwain96 7 месяцев назад

    This is GOLD! Thanks to you both for the extraordinary work you do AND teach!

  • @druzzzzzz
    @druzzzzzz Год назад +1

    This was a fantastic video! I could not see the JA3 fingerprint on my version of Wireshark, will be trying to figure out how to add it to the packets. I will definitely be looking for Chris Greers course on this, I had fun.

  • @refaiabdeen5943
    @refaiabdeen5943 Год назад +1

    Cheers Guys. That was Awesome and amazing to watch and understand as much as possible. Looking forward to more of this content.

  • @MarathonMade
    @MarathonMade 3 месяца назад

    watching this im thinking to my self and someone whos just started learning "I can learn and do this" :) thank you two for this video 1 year ago

  • @Dani-cr7cj
    @Dani-cr7cj Год назад +3

    Amazing video, thank you Chris and David for this amazing content.

  • @Pursuitdnb
    @Pursuitdnb Год назад +1

    Great video! Thanks David and Chris!

  • @cacurazi
    @cacurazi Год назад +1

    Amazing content... Thanks David & Chris

  • @factoidsandquotations
    @factoidsandquotations Год назад +1

    One of my favorite videos David, this guys good.

  • @kmonto1971
    @kmonto1971 Год назад +1

    @Chris Greer - it was great meeting you at DefCon this year. Great class as well.

    • @ChrisGreer
      @ChrisGreer Год назад +1

      You too! Great to meet you and thanks for watching/commenting!

  • @jesussaeta8383
    @jesussaeta8383 Год назад +1

    Great great stuff you guys, you’ve got my creative juices flowing……thank you both very much.

  • @coolboy288
    @coolboy288 Год назад +1

    Thanks Chris and David for this very informative session.

  • @bAd-sf7iu
    @bAd-sf7iu 5 месяцев назад

    Thank you for your great lecture!! I and my friends and neighbors have been hacked by a hacking group. I can find a hacking clue, because Chris and David teach sophisticated method. I expect your next great teaching movie for hunting hackers!

  • @Lucas-md8gg
    @Lucas-md8gg Год назад +2

    Thanks for the content! Chris is awesome!

  • @romemadali84
    @romemadali84 Год назад +1

    i really love how Chris Greer explains pcap

  • @sidalexis
    @sidalexis Год назад +2

    Currently studying Chris Greer's Wireshark course on Udemy. Fantastic experience

  • @Supahelt98
    @Supahelt98 7 месяцев назад

    Thanks to you both for creating such valuable content!

  • @centralscrutinizer5116
    @centralscrutinizer5116 Год назад +1

    Hey David. Yet another great video. Just so you know, I watch MOST of your videos on the youtube app on my smart tv. Unfortunately, I can't like, subscribe or comment on videos when viewing them this way( I don't log into youtube there). Therefore, only about 1 in 10 videos get a like by me, but the truth is, I like them all!!!

  • @augustedrifande6017
    @augustedrifande6017 7 месяцев назад

    It's really a superb video, obvious to someone with little experience, clear and audible, really great work, I love this kind of content, many thanks :-). (Addressed to David Bombal and Chris Greer).

  • @rajneeshrai1781
    @rajneeshrai1781 Год назад +8

    Another episode... Time to grab the packet cap 🧢 💯

    • @davidbombal
      @davidbombal  Год назад +1

      Hope you enjoy the video Rajneesh!

  • @alexandrohdez3982
    @alexandrohdez3982 Год назад

    Previous video and this are GREAT. 👏👏👏👏👏

  • @OLDMANDOM42.Dominic
    @OLDMANDOM42.Dominic Год назад +2

    WOW! I have been in IT for over 25 years. This guy just got me interested in another facet of IT.. just splendid! Thanks!

  • @peacefulencounters9466
    @peacefulencounters9466 8 месяцев назад

    Great content David and Chris

  • @jzk224
    @jzk224 11 месяцев назад +1

    Great video. I just spent months on a QUIC baddy for a big org.
    Thanks and I’ll definitely check out your channel

  • @fahmimohamadramadhan3978
    @fahmimohamadramadhan3978 Год назад +2

    What a great video, helps A LOT in the beginning.

  • @massterrbarber
    @massterrbarber 4 месяца назад

    Great content and I’m a master barber 💈 and I have been on the edge of my seat from the very beginning to the end so this is how it gets done and it’s been interesting to watch so I’m thinking about doing this as fun 🤩 and like you said a beginner tech guy could get lucky 🍀 so my goal is to understand the hunt. Thanks 🙏 for being your self.

  • @michelantoniovio934
    @michelantoniovio934 Год назад +1

    @Chris Greer you're amazing. I'm always watching your videos. Congrats!!! David thanks a lot to share this content with us...

  • @eyup8267
    @eyup8267 Год назад +1

    Thank's you David for informations 🌙

  • @Glenners
    @Glenners Год назад +5

    I love Chris! He's always got the nitty gritty useful info.

  • @dustinhxc
    @dustinhxc Год назад +1

    Extremely entertaining and informative!

  • @m3ntas
    @m3ntas Год назад +1

    Amazing video David!!! I learned a lot! :) Thanks Chris too, you are a Gigachad!

  • @dokkin9549
    @dokkin9549 Месяц назад

    I'm a student and I really appreciate and understand this content. Im still longway to go to obtain such skill and knowledge. hope more vids like this

  • @davidgreening173
    @davidgreening173 Год назад

    Nice channel. Fellow analyst pointed me here a few days ago. First thing I recognised, the SA accent.

  • @madankhatri2080
    @madankhatri2080 Год назад +5

    Nice video David,
    Please invite digital forensic hackers

  • @Awooga765
    @Awooga765 Год назад +2

    Whoa! I remember doing this level of analysis in graduate school. I loved it but was told by others that this wasn't an in-demand skill.

    • @lora4624
      @lora4624 Год назад

      What?? Why wouldnt it be?

    • @jasonb2221
      @jasonb2221 Год назад +1

      @@lora4624 I was thinking the exact same thing. Why wouldn't knowing how to detect malware and know how it operates in a deep level not relevant in today's cyber space?

  • @Uncle_Buzz
    @Uncle_Buzz 4 месяца назад

    Chris Greer, putting the FUN in fundamentals.

    • @Uncle_Buzz
      @Uncle_Buzz 4 месяца назад

      ... or is it the mental... ?

  • @ballons789
    @ballons789 Год назад +2

    Hi David. Recently passed my CCNA and started learning about wireshark by following Chris Greers videos. I wanted to learn more about networking at the packet level but now im hooked with threat hunting. Finding out what could be lurking in your network it’s exciting. Have you guys dropped the threat hunting course?

  • @temynator
    @temynator 7 месяцев назад +1

    I'm liking that Shark 🦈 stuff man!! I'm actually taking the Google IT support certificate! 😅

  • @majiddehbi9186
    @majiddehbi9186 Год назад +1

    Great duo as always thx for ever and god bless u

  • @danjoseph5707
    @danjoseph5707 Год назад +1

    Really informative video. Thank you

  • @tawabullas5058
    @tawabullas5058 Год назад +4

    We need more contents like this

    • @davidbombal
      @davidbombal  Год назад

      Chris is working on a full course :) Hopefully also get him back on the channel soon.

    • @Abdirahmaann
      @Abdirahmaann Год назад

      @@davidbombal What is that’s course David can you name that course Chris doing

  • @bAd-sf7iu
    @bAd-sf7iu 5 месяцев назад

    Thank you for your great lecture!! I am a victim of hacking. I can get hacking clue, because David and Chris taught sophisticatid method. I hope you upload further method for hunting hackers!

  • @muhammadabdul7696
    @muhammadabdul7696 Год назад +3

    Perfect Timing!

    • @davidbombal
      @davidbombal  Год назад +1

      Hope you enjoy the video Muhammad!

    • @muhammadabdul7696
      @muhammadabdul7696 Год назад

      @@davidbombal sure will do..
      Thanks a ton 🙂Chris and David

  • @evodefense
    @evodefense 9 месяцев назад +1

    Amazing video thank you for this video!

  • @dummyload7803
    @dummyload7803 8 месяцев назад +1

    wow, that was very interessting. People call me a hacker sometimes only because i know the "anykey" :) After this video i learned i know nothing. Never used wireshark however i am familiar with the programname. Too little time left to learn all the stuff that is out there

  • @puetzranch
    @puetzranch Год назад

    Great info! Thanks for sharing.

  • @icaroo9084
    @icaroo9084 Год назад +1

    Amazing content!

  • @johnsnow1062
    @johnsnow1062 Год назад +1

    Thank you so much for the lesson

  • @WireSharkFest
    @WireSharkFest Год назад

    Awesome video guys! 🦈

  • @anjanbora7943
    @anjanbora7943 9 месяцев назад +2

    Best hacker channel on RUclips ❤

  • @williambarrett7108
    @williambarrett7108 Год назад +1

    Thank you so much for these videos! How do you load P-caps into wire shark? That nuts and bolts kind of content would be great!

  • @Bahlkris100
    @Bahlkris100 Год назад +1

    As always, great stuff.

  • @hacmuratkaraman1583
    @hacmuratkaraman1583 Год назад

    Thank you David.

  • @ricosan7341
    @ricosan7341 Год назад

    David. I like your channel.

  • @MichaelSmith-bi8pc
    @MichaelSmith-bi8pc 7 месяцев назад

    A really useful video. Thesis is so powerful and every day is a learning day. Have an anan 8000fle. Glad I have not updated sunsdr2 software form vs2.only thing I miss on thesis is recording band activity and the ability to variably change FM rx bandwidth

  • @jmatuus
    @jmatuus Год назад +1

    This is public service! Thank you!

  • @sid8880
    @sid8880 Год назад +1

    Hi David, thanks for setting this up with Chris, I’m just starting off with wire shark and have already purchased your Udemy core skills course, its on my to do list! Was just looking to purchase the joint one ‘getting started’ In which order do you recommend completing?

  • @dirty9496
    @dirty9496 7 месяцев назад

    Love the videos! Can you guys make one that is dedicated to setting up Wireshark profiles?

  • @satoshiborishi6898
    @satoshiborishi6898 3 месяца назад

    Great tutorial with a real life example!

  • @harahatchi9923
    @harahatchi9923 Год назад +1

    Great subject and wish to dive on similar subjects in future episodes.
    BTW I prefer wired earsets lool : D

  • @andreibratosin1199
    @andreibratosin1199 8 месяцев назад

    Brilliant stuff!!

  • @gtoo9499
    @gtoo9499 9 месяцев назад

    OMG u Asome!
    Thank you for your video, this is really helpful =)

  • @manzenshaaegis8783
    @manzenshaaegis8783 Месяц назад

    Great stuff.

  • @kevinweeks3824
    @kevinweeks3824 7 месяцев назад

    great video!~

  • @mahato-khushboo19
    @mahato-khushboo19 9 месяцев назад +2

    @chrisGreer,
    Thanks for the such a wonderful information. I am little bit confuse like if I use the Wireshark in production environment then how to capture the packets to analysis any malicious traffic on daily basis ? Is there any function in Wireshark so that we can analysis and filter out the all the malicious easily? And provide some kind of alert alram or notification something like that.

  • @kialim
    @kialim Год назад +1

    Chris, what are your views on Network Detection & Response (NDR) solutions? What are your thoughts on enterprises moving to the cloud? How do you perform threat hunting in such an environment. Thanks!

  • @privateinfo4820
    @privateinfo4820 Год назад +1

    Trying to follow along.. and possibly purchase some of Chris' training, but I notice on my Wireshark installation VM on our domain (domain admin rights) my country columns aren't populated at all (when viewing endpoints to check for nefarious countries). Am I missing a cfg or something somewhere??? Thanks for this video - very helpful!!