These videos have been an invaluable source of information and instruction for me. This man is definitely a 'guru' in IP Sec and I'm sure too many more specific fields to list!! Thank you so much for the tutorials Sir!!
I love Wireshark, and I think your videos are great starting point for anyone trying to learn infosec. Thank you for the effort you put into your videos!
This should be fun. I would love to see a video using wireshark intercepting and reading USB traffic. Love your content man one of my favorite channels!
That was really, really good. Seeing Wireshark being applied in a Malware Analyst/Threat Hunter perspective in a real-world scenario really made it 1000% more exciting. I did the lab myself as I watched the video and documented the whole process in my blog. Very appreciated.
That's a great idea.. as a graduate student about to enter the security workforce, a write-up of this process would be a great talking point in interviews.
Awesome information! Question: The traffic capture logs can be very long correct? If this attack has happened some time ago would it be very difficult (time consuming) to find the ORIGINAL "GET" request that was the reason for infection?
Really love your teaching method , clear and sweet . wish you can add wireshark packet analysis for Ransomware too and give us tip to find indicator of compromise from it too
i followed you since you had only 340 subscribers brother. can you return again about hacking os system and android thanks a lot of brother..i wish you success and healthy and your family too
How did you get those ssl/tsl keys? Is wireshark able to intercept those keys exchange and Save to file or did you use some other tools? Good video, keep the work.
in the real world you either find the keys on a host after exploiting a network /MITM or you have access to the keys another way such as if you are on the dev/IT team and you need to troubleshoot your application traffic, so you just load the keys into wireshark to be able to decrypt and analyze the traffic.
What is the key that Wireshark use to decrypt the traffic? Is it private key took from server or synchronous key that is generated during SSL/TSL negotiation?
Disclaimer for black hats: he has the key because he is executing this for a client. Should be obvious due to every video he makes is from a security perspective and not an attack😅
not going to lie, whenever you start by saying heres the keys, i immediately check out because this doesnt really show you the process from start to finish you expect people to know information to make use of the tutorial more so this way and instantly lost interest and looked elsewhere doesnt matter how well you explaining the rest of the video, because not all use cases will be monitoring a browser.. some times its an external device over wifi or internalized in lan and i dunno just feels very incomplete and shoveled into a very specific use case.. and btw if you capture har files they litterally have full SSL traffic noted and something like charles proxy can read this just fine and exports curl from it even, stuff wireshark doesnt even do or isnt clear it can perform
These videos have been an invaluable source of information and instruction for me. This man is definitely a 'guru' in IP Sec and I'm sure too many more specific fields to list!! Thank you so much for the tutorials Sir!!
I love Wireshark, and I think your videos are great starting point for anyone trying to learn infosec.
Thank you for the effort you put into your videos!
This should be fun. I would love to see a video using wireshark intercepting and reading USB traffic. Love your content man one of my favorite channels!
Much appreciated, thank you for the video suggestion. I will add it to the video todo list.
That was really, really good. Seeing Wireshark being applied in a Malware Analyst/Threat Hunter perspective in a real-world scenario really made it 1000% more exciting. I did the lab myself as I watched the video and documented the whole process in my blog. Very appreciated.
That's a great idea.. as a graduate student about to enter the security workforce, a write-up of this process would be a great talking point in interviews.
Can we get the name of your blog?
top content this week thank you alexis👊🤓
Kudos to the instructor for such a great tutorial. It opened my eyes to what Wireshark can do and it's capabilities.
This is not a big deal, the real question is how to capture those keys.
LOL Yeah. A big bummer for me.
With a man in the middle attack
Exactly
Exacly
How would I find these keys in a .pcap that I am normally accessing on the internet?
Nice tutorial thank you. By the way, is there any cheat sheet for wire shark filters?
how did you have the key ??
Thanks for the information and keep it up!!!
Awesome information!
Question:
The traffic capture logs can be very long correct? If this attack has happened some time ago would it be very difficult (time consuming) to find the ORIGINAL "GET" request that was the reason for infection?
Good video. You need to slow down a bit and explain why you choose a certain option. Thank you.
Would this series help someone get into a base level job what would be the path to follow to get there
you have a key and you show me how to open the door?
Really love your teaching method , clear and sweet . wish you can add wireshark packet analysis for Ransomware too and give us tip to find indicator of compromise from it too
Will be covering this in the future.
@@HackerSploit we are in future now 😁
But how we capture keys in our system 🙄
Hello Sir,
May I know why are you excluding SSDP protocol from the search?
Love your content buddy
Thank you for these tutorials!
Please I can't download the files, Is there any other way of getting them?
How to download that ssl file i need your help
Hii,, Do you know any tools to sniff https traffic. ettercap and other tools sniff only http traffic. Is there any tools to capture HTTPS?
thank you. Very informative video.
But where are we actually decrypting the SSL Protocol? Video title say the same......
i cant decrypt those SSL cert from GlobalSign but Im able to decrypt LetsEncrypt. Thats strange..
Title: You've got my attention. Better be more then only IP adressess☺
He delivered 👍
a video on how to retrieve the certificates while capturing would be great
thx very good content and interesting one
How much for Android payloads decompile n compile n for signature
i followed you since you had only 340 subscribers brother.
can you return again about hacking os system and android
thanks a lot of brother..i wish you success and healthy and your family too
Asante sana!
How did you get those ssl/tsl keys? Is wireshark able to intercept those keys exchange and Save to file or did you use some other tools? Good video, keep the work.
in the real world you either find the keys on a host after exploiting a network /MITM or you have access to the keys another way such as if you are on the dev/IT team and you need to troubleshoot your application traffic, so you just load the keys into wireshark to be able to decrypt and analyze the traffic.
@@LadyLatency thank you for explaining this. Was wondering the same question myself!
What is the key that Wireshark use to decrypt the traffic? Is it private key took from server or synchronous key that is generated during SSL/TSL negotiation?
Thank you a lot!
Your Intro sounds like Stranger Things theme music😅😁
Can you maybe make a video about HTTPS (certificate) spoofing.
I think you can also decrypt it with wireshark.
Nice vid btw.
Nobody ( human/ normal pc) can decrypt HTTPS traffic without private key of server.
@@knife_is_op951 that is why i asked certificate spoofing
With bettercap and ettercap man in the middle attacks are simple to do
so can we see encrypted ssl password and usernames?
Disclaimer for black hats: he has the key because he is executing this for a client. Should be obvious due to every video he makes is from a security perspective and not an attack😅
Thx bro❤😊
Music name, please?!
Please make a video on Darknet chip
i cant wait for the red team videos! (if you didnt and want to do.)
We already have a red team playlist.
@@HackerSploit going to watch it! thank you very much.
@@HackerSploit how i couldnt guess btw. you are helping this community very much.
Is that possible?
Yes
اكيد
بس لازم يكون تشفير الموقع سي
didnt know this is possible
❤❤❤
Nice
good.
backend is unhealthy error 503 while downloading zip file
not going to lie, whenever you start by saying heres the keys, i immediately check out because this doesnt really show you the process from start to finish you expect people to know information to make use of the tutorial more so this way and instantly lost interest and looked elsewhere doesnt matter how well you explaining the rest of the video, because not all use cases will be monitoring a browser.. some times its an external device over wifi or internalized in lan and i dunno just feels very incomplete and shoveled into a very specific use case.. and btw if you capture har files they litterally have full SSL traffic noted and something like charles proxy can read this just fine and exports curl from it even, stuff wireshark doesnt even do or isnt clear it can perform
Any good material on hacking security camera dvr on the wifi network?
When will you distribute your Linux system ?
Please ans me !!!
Sometime later this year.
😍😍😍😍😍😍😍
❤️❤️
you could have just ask your neighbor nicely
Was useless for me
whatsapp
!!!
BS