These videos have been an invaluable source of information and instruction for me. This man is definitely a 'guru' in IP Sec and I'm sure too many more specific fields to list!! Thank you so much for the tutorials Sir!!
This should be fun. I would love to see a video using wireshark intercepting and reading USB traffic. Love your content man one of my favorite channels!
That was really, really good. Seeing Wireshark being applied in a Malware Analyst/Threat Hunter perspective in a real-world scenario really made it 1000% more exciting. I did the lab myself as I watched the video and documented the whole process in my blog. Very appreciated.
That's a great idea.. as a graduate student about to enter the security workforce, a write-up of this process would be a great talking point in interviews.
I love Wireshark, and I think your videos are great starting point for anyone trying to learn infosec. Thank you for the effort you put into your videos!
Disclaimer for black hats: he has the key because he is executing this for a client. Should be obvious due to every video he makes is from a security perspective and not an attack😅
Really love your teaching method , clear and sweet . wish you can add wireshark packet analysis for Ransomware too and give us tip to find indicator of compromise from it too
i followed you since you had only 340 subscribers brother. can you return again about hacking os system and android thanks a lot of brother..i wish you success and healthy and your family too
Awesome information! Question: The traffic capture logs can be very long correct? If this attack has happened some time ago would it be very difficult (time consuming) to find the ORIGINAL "GET" request that was the reason for infection?
How did you get those ssl/tsl keys? Is wireshark able to intercept those keys exchange and Save to file or did you use some other tools? Good video, keep the work.
in the real world you either find the keys on a host after exploiting a network /MITM or you have access to the keys another way such as if you are on the dev/IT team and you need to troubleshoot your application traffic, so you just load the keys into wireshark to be able to decrypt and analyze the traffic.
What is the key that Wireshark use to decrypt the traffic? Is it private key took from server or synchronous key that is generated during SSL/TSL negotiation?
not going to lie, whenever you start by saying heres the keys, i immediately check out because this doesnt really show you the process from start to finish you expect people to know information to make use of the tutorial more so this way and instantly lost interest and looked elsewhere doesnt matter how well you explaining the rest of the video, because not all use cases will be monitoring a browser.. some times its an external device over wifi or internalized in lan and i dunno just feels very incomplete and shoveled into a very specific use case.. and btw if you capture har files they litterally have full SSL traffic noted and something like charles proxy can read this just fine and exports curl from it even, stuff wireshark doesnt even do or isnt clear it can perform
These videos have been an invaluable source of information and instruction for me. This man is definitely a 'guru' in IP Sec and I'm sure too many more specific fields to list!! Thank you so much for the tutorials Sir!!
This should be fun. I would love to see a video using wireshark intercepting and reading USB traffic. Love your content man one of my favorite channels!
Much appreciated, thank you for the video suggestion. I will add it to the video todo list.
That was really, really good. Seeing Wireshark being applied in a Malware Analyst/Threat Hunter perspective in a real-world scenario really made it 1000% more exciting. I did the lab myself as I watched the video and documented the whole process in my blog. Very appreciated.
That's a great idea.. as a graduate student about to enter the security workforce, a write-up of this process would be a great talking point in interviews.
Can we get the name of your blog?
I love Wireshark, and I think your videos are great starting point for anyone trying to learn infosec.
Thank you for the effort you put into your videos!
This is not a big deal, the real question is how to capture those keys.
LOL Yeah. A big bummer for me.
With a man in the middle attack
Exactly
Kudos to the instructor for such a great tutorial. It opened my eyes to what Wireshark can do and it's capabilities.
top content this week thank you alexis👊🤓
Thanks for the information and keep it up!!!
Disclaimer for black hats: he has the key because he is executing this for a client. Should be obvious due to every video he makes is from a security perspective and not an attack😅
Thank you for these tutorials!
Good video. You need to slow down a bit and explain why you choose a certain option. Thank you.
Love your content buddy
But how we capture keys in our system 🙄
Really love your teaching method , clear and sweet . wish you can add wireshark packet analysis for Ransomware too and give us tip to find indicator of compromise from it too
Will be covering this in the future.
@@HackerSploit we are in future now 😁
you have a key and you show me how to open the door?
a video on how to retrieve the certificates while capturing would be great
Nice tutorial thank you. By the way, is there any cheat sheet for wire shark filters?
thank you. Very informative video.
how did you have the key ??
i followed you since you had only 340 subscribers brother.
can you return again about hacking os system and android
thanks a lot of brother..i wish you success and healthy and your family too
Title: You've got my attention. Better be more then only IP adressess☺
He delivered 👍
With bettercap and ettercap man in the middle attacks are simple to do
Thank you a lot!
Awesome information!
Question:
The traffic capture logs can be very long correct? If this attack has happened some time ago would it be very difficult (time consuming) to find the ORIGINAL "GET" request that was the reason for infection?
Hello Sir,
May I know why are you excluding SSDP protocol from the search?
thx very good content and interesting one
❤❤❤
Asante sana!
Can you maybe make a video about HTTPS (certificate) spoofing.
I think you can also decrypt it with wireshark.
Nice vid btw.
Nobody ( human/ normal pc) can decrypt HTTPS traffic without private key of server.
@@knife_is_op951 that is why i asked certificate spoofing
Your Intro sounds like Stranger Things theme music😅😁
Would this series help someone get into a base level job what would be the path to follow to get there
But where are we actually decrypting the SSL Protocol? Video title say the same......
Thx bro❤😊
didnt know this is possible
Please make a video on Darknet chip
i cant decrypt those SSL cert from GlobalSign but Im able to decrypt LetsEncrypt. Thats strange..
Nice
good.
Please I can't download the files, Is there any other way of getting them?
How did you get those ssl/tsl keys? Is wireshark able to intercept those keys exchange and Save to file or did you use some other tools? Good video, keep the work.
in the real world you either find the keys on a host after exploiting a network /MITM or you have access to the keys another way such as if you are on the dev/IT team and you need to troubleshoot your application traffic, so you just load the keys into wireshark to be able to decrypt and analyze the traffic.
@@LadyLatency thank you for explaining this. Was wondering the same question myself!
What is the key that Wireshark use to decrypt the traffic? Is it private key took from server or synchronous key that is generated during SSL/TSL negotiation?
i cant wait for the red team videos! (if you didnt and want to do.)
We already have a red team playlist.
@@HackerSploit going to watch it! thank you very much.
@@HackerSploit how i couldnt guess btw. you are helping this community very much.
How much for Android payloads decompile n compile n for signature
Hii,, Do you know any tools to sniff https traffic. ettercap and other tools sniff only http traffic. Is there any tools to capture HTTPS?
so can we see encrypted ssl password and usernames?
❤️❤️
😍😍😍😍😍😍😍
backend is unhealthy error 503 while downloading zip file
you could have just ask your neighbor nicely
Music name, please?!
not going to lie, whenever you start by saying heres the keys, i immediately check out because this doesnt really show you the process from start to finish you expect people to know information to make use of the tutorial more so this way and instantly lost interest and looked elsewhere doesnt matter how well you explaining the rest of the video, because not all use cases will be monitoring a browser.. some times its an external device over wifi or internalized in lan and i dunno just feels very incomplete and shoveled into a very specific use case.. and btw if you capture har files they litterally have full SSL traffic noted and something like charles proxy can read this just fine and exports curl from it even, stuff wireshark doesnt even do or isnt clear it can perform
Any good material on hacking security camera dvr on the wifi network?
Was useless for me
Is that possible?
Yes
اكيد
بس لازم يكون تشفير الموقع سي
When will you distribute your Linux system ?
Please ans me !!!
Sometime later this year.
!!!
whatsapp
BS
How would I find these keys in a .pcap that I am normally accessing on the internet?