How to Listen to Phone Calls in Wireshark

Поделиться
HTML-код
  • Опубликовано: 21 дек 2024

Комментарии • 155

  • @royalcanadianbearforce9841
    @royalcanadianbearforce9841 10 месяцев назад +36

    I was thinking of setting up VOIP this year for the home office. Perfect timing! This should be very fun to mess around with in the lab! Thank you very much for the informative video!

  • @paxdriver
    @paxdriver 10 месяцев назад +21

    Wireshark should definitely match rtp streams whenever it notices pairs like that. The window is already found under "telephony", it's not a stretch to presume auto-highlighting pairs of streams would be useful lol

  • @mathewrtaylor
    @mathewrtaylor 10 месяцев назад +25

    Incredible, thanks for the demo!

  • @mogan336
    @mogan336 9 месяцев назад +9

    This is gonna be fun!!!

  • @krishnasharma8195
    @krishnasharma8195 4 месяца назад +3

    Learnt something new today, thank you ❤

  • @vladislavkaras491
    @vladislavkaras491 Месяц назад +1

    Thanks for the demonstration!

  • @roberto4898
    @roberto4898 9 месяцев назад +4

    Juan is still trying to find which one are they testing

  • @bnk28zfp
    @bnk28zfp 10 месяцев назад +5

    wow amazing example love your channel!!!!!!🎉🎉

  • @KrappyPatty-ry6lj
    @KrappyPatty-ry6lj 10 месяцев назад +9

    Sick stuff, im subbing. You think you could do a Wireshark101 series? That would be very helpful.

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад +5

      I’m thinking about it! I’m getting better at the production stuff so makes it easier to fit in videos in my spare time

  • @kapilsinghyadav5836
    @kapilsinghyadav5836 10 месяцев назад +3

    Amazing video sir 👍 support from India 😀

  • @davraheal6606
    @davraheal6606 8 месяцев назад +3

    Seriously cool bro

  • @elaceaceak2357
    @elaceaceak2357 9 месяцев назад +2

    What types of call does this work with ?
    WhatsApp is encrypted right ?
    And so are normal calls (non wifi)
    So what kind of calls does this work on ?

    • @plaintextpackets
      @plaintextpackets  9 месяцев назад +2

      RTP is used by voip phones in large enterprises, schools, hospitals, etc

  • @xDelmore
    @xDelmore 4 месяца назад +1

    Do you have to be on the same network to listen?

    • @plaintextpackets
      @plaintextpackets  4 месяца назад +1

      You need to take a capture of the traffic, there are methods to do this like ARP poisoning which do require you to be on the same network

    • @xDelmore
      @xDelmore 4 месяца назад

      @@plaintextpackets can you also make a video on how to capture otp messages with Wireshark?

    • @uLIEuDIE80
      @uLIEuDIE80 2 месяца назад

      @@xDelmore I think your asking for a bit toooooo much, so just keep yapping and lieing. il listen,

  • @joelxcore
    @joelxcore 7 месяцев назад +4

    Whats the best way to defend against this? SRTP, TLS?

    • @plaintextpackets
      @plaintextpackets  7 месяцев назад

      Any sort of encrypted voice protocol. Many web-based voice apps are encrypted.

  • @TheTrueCBaer
    @TheTrueCBaer 10 месяцев назад +1

    A few years ago I had to set up an analog fax over VoIP. I had trouble getting It working (turned out to be delay, echo and telephone port impedance). Is there a way that Wireshark can decode analog modulated data over VoIP like fax and modems?

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад

      That’s a good question, I believe you’d have to use like a VoIP converter to capture the traffic which would defeat the point

    • @TheTrueCBaer
      @TheTrueCBaer 10 месяцев назад +1

      @@plaintextpackets The ATA used was a Grandstream HT-801.
      Here in Germany a huge number of fax machines are still in service. Even after the landline and ISDN networks are almost completely phased out. Mostly the ISP provided routers have ATAs integrated, some even have S0 ports for ISDN like the Fritzbox 7590. These devices are mostly plug and play. That makes the use of telephones and fax machines pretty easy.
      And yes an analog piece of paper digitized by a fax machine which then modulates an analog audio signal into and ATA which converts it to digital VoIP sends it over the internet and then everything in reverse sounds stupid. But the fax system has some qualities that modern IT still lacks.
      When i debugged it I used Wireshark to export the audio from the RTP stream and used an obscure tool (forgot the name) to debug the fax handshake.

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад +1

      Yeah if you can get the RTP portion of it then you can at least see if it is a handshake problem. But if the analog piece has signal quality issues you won't necessarily see that

  • @paradownload2051
    @paradownload2051 10 месяцев назад +6

    Ip phone only? Viber call?

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад +5

      Yes this will only work with ip phones using RTP

  • @parikshitkumar6485
    @parikshitkumar6485 8 месяцев назад +1

    You are real pro...interesting

  • @suwenhao9864
    @suwenhao9864 8 месяцев назад

    Hi,sir . I’ve get two tiny questions.
    Is the SBC in my window pc primarily or I should download one?
    And sir you click the “telephony-RTP-RTP Streams”
    to find the streams instead of using filter Protocol==RTP , how could understand “RTP”, is something in protocol or it is protocol itself?🤔️
    Thanks so much
    ,

  • @eviconvidoesmerime9971
    @eviconvidoesmerime9971 9 месяцев назад

    How do I intercept other user not necessary my own conversation , but communication with party in the same network with me

  • @umarmuslim8685
    @umarmuslim8685 10 месяцев назад +3

    please do you have a CCNA videos?

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад

      I did my CCNA years ago and would probably fail now 😅

  • @MrZANE42
    @MrZANE42 10 месяцев назад +1

    Would a capture of managed switch port mirror would work also, or would you just get one side of the data? A mirror of a port that one of the parties is connected to of course

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад +1

      Yes this would work if you mirror the actual access port connected to one of the PCs. If you mirror a port at the distribution or core layers you may miss one direction.

  • @rashidbinzaiyed7149
    @rashidbinzaiyed7149 10 месяцев назад +1

    Can I listen to normal calls of mobile phones? Like Android to Android, iPhone to iPhone, Android to iPhone or telephone etc?

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад +1

      No, cellular voice calls from modern cellphones are all encrypted

    • @rashidbinzaiyed7149
      @rashidbinzaiyed7149 10 месяцев назад

      @@plaintextpackets is there any way to listen to them without touching or hacking the target phone? Because I'm in urgent need of that, (some family issues has to be solved with solid evidence) any way to crack the encryption?

    • @xfy123
      @xfy123 9 месяцев назад

      ​@@rashidbinzaiyed7149you would need a setup to capture the data and depending if it's a 3/4/5g connection a good amount of time to brute force the encryption. It's doable but it takes time and if you are caught you will probably spend a few years in prison.

    • @KR1SR1GH7
      @KR1SR1GH7 8 месяцев назад

      @@rashidbinzaiyed7149 rashid XDD ofc indian guy rofl

  • @novianindy887
    @novianindy887 10 месяцев назад +54

    is it not enceypted at all? what about whatsapp calls?

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад +58

      RTP traffic is generally unencrypted within networks (companies, school campuses, etc). If exchanged over the internet or insecure networks vendors are likely to use encryption. WhatsApp uses its own proprietary protocol which is encrypted

    • @MohammedLee-e1z
      @MohammedLee-e1z 10 месяцев назад

      Whatsapp is end-to-end encrypted from user a to user b. But in realty you can’t trust nobody . It’s a question about time.
      They stored NOW our data in hope that one day when the encrypt key ist locked up they can’t see what is written befor.
      All what we write and all what we say is in the end all zero and one .
      In the future when quantum computer encrypt from today some standard encrypt methods is it easy to go back and lock what is written befor.

    • @karim6514
      @karim6514 10 месяцев назад +10

      I believe WhatsApp uses the same encryption as Signal

    • @Pokedollar
      @Pokedollar 10 месяцев назад

      ​@@karim6514Well, they claim to use it. They say they use the signal-protocol, but since Signal is Open source, they are free to temper with that as they wish

    • @Pokedollar
      @Pokedollar 10 месяцев назад +5

      But yes, it's end to end encrypted

  • @HForYou1
    @HForYou1 3 месяца назад

    I connected mobile hotspot with pc and same hotspot connect with my device but not showing anything in RTP why

  • @MohitKhare
    @MohitKhare 10 месяцев назад +2

    Thanks man. BTW you got a new sub! ♥

  • @jrodrig9212
    @jrodrig9212 10 месяцев назад +3

    Really good video

  • @KevinK3vin0
    @KevinK3vin0 10 месяцев назад

    Does the device need to be connected to same network as the pc ?

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад

      As shown in the video this only works if you are capturing from the PC where the call is taking place. If you want to sniff the traffic from another PC you need to do something like ARP poisoning

    • @KevinK3vin0
      @KevinK3vin0 10 месяцев назад

      @@plaintextpackets so I won't be able to hear any phone calls made on smartphones?

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад

      Nope

  • @joshuamcnair8762
    @joshuamcnair8762 10 месяцев назад

    How would you get wireshark to sniff the traffic of another device? In this case the router or middleman device?

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад +2

      From the router: the router would either need to support packet capture via gui or a CLI tool like tcpdump. Some modern or small business routers have this capability, most enterprise ones do as well.
      If you’re somewhat advanced you can look up how to turn an old Linux box or a raspberry pi into a Linux network tap. That would allow you to capture the traffic by placing the tap between your router and PC. There are professional taps but they are $$$&.

  • @Nejtak853
    @Nejtak853 7 месяцев назад +1

    Do you have another channel where I can follow you? Discord, Reddit?

  • @mohdabduljameel1184
    @mohdabduljameel1184 10 месяцев назад

    How can we capture the same packet with our pc?
    Without using any existing files can you please show it live,
    That you are capturing RTP etc etc

  • @icdlight9284
    @icdlight9284 10 месяцев назад

    Can a vpn app or other apps perform this since it is connected in ?

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад

      Can you restate the question?

    • @icdlight9284
      @icdlight9284 10 месяцев назад

      ​@@plaintextpackets if i install a vpn application and since it is connected to my network can they do such things as you did in my network

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад

      If the vpn client is installed on your PC then no they won’t be able to see the traffic. This is why you should use VPN when in public networks like airports or coffee shops

  • @potcleanx7693
    @potcleanx7693 10 месяцев назад +1

    what kind of call is this?

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад

      Digital voice call using the RTP protocol

  • @aliabiyev1553
    @aliabiyev1553 10 месяцев назад +3

    Wow. Thank you so much.. 👍

  • @Ale-m3u
    @Ale-m3u 10 месяцев назад

    In order to determine if the target is using rtp we would type rtp in wireshark right

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад +1

      Yep you can use ‘rtp’ as your display filter

    • @Ale-m3u
      @Ale-m3u 10 месяцев назад

      @@plaintextpackets would this work against the text now app how would we do that

  • @mohamad.A
    @mohamad.A 10 месяцев назад

    why when i open RTP streams its not showing anything?

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад

      You may not have RTP packets present in the capture.

    • @mohamad.A
      @mohamad.A 10 месяцев назад

      @@plaintextpackets dose it work on whatsapp and Instagram voice calls?

    • @plaintextpackets
      @plaintextpackets  9 месяцев назад

      Nope

    • @HForYou1
      @HForYou1 3 месяца назад

      I called with sip both side but not showing​@@plaintextpackets

  • @gunmanwhy657
    @gunmanwhy657 10 месяцев назад +1

    How can I contact with you brother?

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад +1

      plaintextpackets@gmail.com

    • @gunmanwhy657
      @gunmanwhy657 10 месяцев назад

      @@plaintextpackets you don't have telegram for easy contact brother?

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад

      No unfortunately I don't

    • @gunmanwhy657
      @gunmanwhy657 10 месяцев назад

      @@plaintextpackets brother I have sent you message

  • @samadel.a765
    @samadel.a765 9 месяцев назад

    00:53 I heard it as "and you should cease to exist💀"

  • @fabiantoro7146
    @fabiantoro7146 10 месяцев назад +2

    Wow, well done! Fantastic demonstration. In fact I can understand the conversation because that's my native language lol. Following the invitation at the end of your video, I had an issue a few weeks back and I captured the packets. The problem was at the other end but I'd like to understand who was sending a reset. How could I upload the pcap file? Long story short: we couldn't send emails just to a specific domain

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад +1

      Thank you Fabian! If you'd like to send in a file, you can do so here: www.dropbox.com/request/eB1ZFDicpOJ5nnft5eSp
      I would be happy to provide the analysis for free, with the condition that I can present the findings on the channel. Let me know!

    • @fabiantoro7146
      @fabiantoro7146 10 месяцев назад

      Thank you @@plaintextpackets! I just uploaded the file. Unfortunately many packets are size limited because I didn't configure monitor capture properly on the switch. I hope it contains enough information

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад

      No problem. Is there a specific conversation you’re focusing on (source Ip / destination Ip), timestamp or protocol?

    • @fabiantoro7146
      @fabiantoro7146 10 месяцев назад

      @@plaintextpackets so sorry. I just realized I sent the unfiltered conversation. In a couple of minutes I will upload just the filtered packets

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад +1

      @fabiantoro7146 check out my latest video, I reviewed your problem!

  • @ogidarmatena
    @ogidarmatena 10 месяцев назад +1

    I want to try

  • @skeeterford2617
    @skeeterford2617 8 месяцев назад

    I’m new at wire shark so do you use wireshark

  • @palois8407
    @palois8407 10 месяцев назад

    Im trying to set these up for companies.... All of the good ones to monitor calls for better customre service 😂😂

  • @CheckpointEngineer
    @CheckpointEngineer 9 месяцев назад

    Please give me a example that a PC to PC call means which application they use for conversation and is there any dedicated device required to take the captured and later analysis using Wireshark.??

  • @coolorphans
    @coolorphans 10 месяцев назад +1

    Wow who designed your thumbnail?

  • @Hackdaplanet-lp1ex
    @Hackdaplanet-lp1ex 5 месяцев назад

    Oh wow u just tap el chapo personal phone...damnnnn 😂

  • @lilcuddles203
    @lilcuddles203 10 месяцев назад

    skip to 4:27

  • @addisonbentley9037
    @addisonbentley9037 10 месяцев назад

    Can this be used as a method of parental controls?

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад

      It could if your kids were using VoIP, but you would need to capture their traffic continuously and store it somewhere. We do it at the Enterprise level but it is costly.

  • @AidenPearce-i6d
    @AidenPearce-i6d 10 месяцев назад +1

    cool videos more plz

  • @JohnWeek-k2v
    @JohnWeek-k2v 10 месяцев назад +1

    Cooool 🎉🎉🎉

  • @AmitJaiswal-sm4bi
    @AmitJaiswal-sm4bi 10 месяцев назад

    Do we need external hardware to capture?

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад +1

      No you can capture from Wireshark or tcpdump if you have access to the pc. I will make a video showing how in the near future

    • @rabbiyatabassum2278
      @rabbiyatabassum2278 10 месяцев назад

      will wait for that video@@plaintextpackets

  • @Rundik
    @Rundik 10 месяцев назад

    For educational purposes only wink wink

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад +2

      To be really good in networking and security you need to know how to break things

  • @adnansakeeb739
    @adnansakeeb739 2 месяца назад +1

    u sound pretty similar to Technoblade.

  • @alisufyan6784
    @alisufyan6784 10 месяцев назад +2

    Thumbs Up

  • @All.Rights.Stolen
    @All.Rights.Stolen 10 месяцев назад

    i know thats isp and even any intellgence can capture my phone call on any network or host ..
    doesnt matter ...😐😐 😊

  • @GjentiG4
    @GjentiG4 10 месяцев назад

    Would this work for discord?

    • @plaintextpackets
      @plaintextpackets  10 месяцев назад +4

      Unfortunately no, Discord uses an encrypted audio codec: discord.com/developers/docs/topics/voice-connections

  • @Itshacksmith
    @Itshacksmith 7 месяцев назад

    Can we sniff volte packets too 😊

  • @rootcode
    @rootcode 7 месяцев назад

    wow

  • @Megasteel32
    @Megasteel32 10 месяцев назад

    how bout you demonstrate not using AI for your thumbnails

  • @MrXtahsee
    @MrXtahsee 9 месяцев назад

    Great vid. New sub, you have discord channel?

  • @a.q118
    @a.q118 9 месяцев назад

    shhhhhhhhhhhhet