Troubleshooting slow networks with Wireshark // wireshark filters // Wireshark performance

Поделиться
HTML-код
  • Опубликовано: 4 июн 2024
  • You are guilty until proven innocent! The network is slow! But is it actually a network issue? Or is it an application issue. Chris Greer explains.
    Wireshark course: davidbombal.wiki/chriswireshark
    Nmap course: davidbombal.wiki/chrisnmap
    // MY STUFF //
    www.amazon.com/shop/davidbombal
    // SOCIAL //
    Discord: / discord
    Twitter: / davidbombal
    Instagram: / davidbombal
    LinkedIn: / davidbombal
    Facebook: / davidbombal.co
    TikTok: / davidbombal
    RUclips: / davidbombal
    //CHRIS GREER //
    Udemy course: davidbombal.wiki/chriswireshark
    LinkedIn: / cgreer
    RUclips: / chrisgreer
    Twitter: / packetpioneer
    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
    // MENU //
    00:00 ▶️ Introduction
    00:35 ▶️ Wireshark filters introduction
    02:20 ▶️ Regular IP filter
    05:28 ▶️ Common filters
    07:10 ▶️ Operators in filters
    08:19 ▶️ Where to get the filter Power Point
    08:55 ▶️ Filter shortcuts
    11:20 ▶️ Filter buttons
    12:10 ▶️ TCP analysis flags
    15:16 ▶️ Filter buttons (cont'd)
    17:15 ▶️ TCP reset
    18:35 ▶️ How to apply filter as display filter
    20:08 ▶️ Experience vs Theory
    22:19 ▶️ Special filters
    29:00 ▶️ Time filters
    38:22 ▶️ Consulting scenario
    49:45 ▶️ HTTPS consulting scenario
    55:33 ▶️ Other filters
    56:46 ▶️ How to simplify p-caps
    59:29 ▶️ Signature filters
    01:01:39 ▶️ Quick recap
    01:02:16 ▶️ Conclusion
    wireshark
    packet analysis
    wireshark installation
    wireshark filters
    wireshark how to find ip address
    wireshark http
    wireshark ip address
    wireshark wifi sniffing
    wireshark tutorial
    tcp analysis
    packet analysis
    free wireshark tutorial
    tcp handshake
    wireshark training
    chris greer,
    roubleshooting with wireshark
    troubleshooting slow networks
    network troubleshooting
    packet capture
    tcp reset
    tcp connections
    network protocols
    packet capture using wireshark
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
    #wireshark #wiresharkfilters #networktroubleshooting
  • НаукаНаука

Комментарии • 243

  • @SirPeterlll
    @SirPeterlll 2 года назад +46

    Yes to war stories. Maybe also examples on how to make (easy) home labs to play around with wireshark to find network and/or application issues.

    • @keyntankeye
      @keyntankeye 2 года назад

      Yea that’s a good one

    • @viv_2489
      @viv_2489 Год назад

      Yeah real life examples

  • @mawutorquarshie7953
    @mawutorquarshie7953 2 года назад +9

    Once again David has brought in someone experienced in wire shark to lead us into the world of Networking troubles. Thanks David.....more of this.

  • @justinbridgman9503
    @justinbridgman9503 2 года назад +15

    That was brilliant, I am returning to networking after a 5 year break and this work you guys are doing has given me a real boost in confidence that I am in the right place. I really enjoyed that, that data was enlightening, accessible and useful. Also interested to hear what that config was!!! Thank you very much

  • @lokeahrana08
    @lokeahrana08 2 года назад +21

    After watching this video I feel like I learned something today. Thanks a lot, David for bringing such an amazing person to the show.

  • @ex7229
    @ex7229 2 года назад +3

    Excellent. I've only been a network Admin 6 months , our Network Engineer retired and I was given the position and got my CCNA. There's so much I do not know. Its overwhelming I knew bare minimum about wireshark but it helped me fix 2 things. This really helped me learn a little more and in the spirit of one of the greatest greek philosophers Seneca says "Every night before going to sleep, we must ask ourselves: what weakness did I overcome today? What virtue did I acquire? " Wireshark is a network engineer virtue as far as I am concerned.

    • @galloe
      @galloe 2 месяца назад

      Great anecdote! Just a tiny detail, Seneca was a Roman philosopher.

  • @oussemaghorbel7578
    @oussemaghorbel7578 2 года назад +11

    This guest is simply amazing! Each time I listen to a session and learn a lot of useful knowledge from it

  • @dwaynesudduth1028
    @dwaynesudduth1028 2 года назад +8

    Another great collaboration by @David Bombal and @Chris Greer! The knowledge bombs dropped here are invaluable, thanks to both of you!

  • @vyasG
    @vyasG 2 года назад +1

    Thank you both for this series. This is gold. Looking forward for more videos on real world experiences. Really loved the consulting scenarios. The teaser in the end was a good one. Will be curiously waiting for that story!

  • @michaeldawkins6812
    @michaeldawkins6812 2 года назад +2

    Thanks Chris and David for some great network knowledge content. One of the growing issues that I have is understanding broadcast traffic / trace coverage / segmentation (vlans).

  • @mashmasho
    @mashmasho 2 года назад +3

    I’m a pretty simple person. I see David Bombal posted a video, I hit like. Haven’t even watched it yet, but I know it will be fantastic! Love your content!

  • @Gh0_-st
    @Gh0_-st 2 года назад +6

    i love how i was just going to call my isp when i just got this video notification 😂

  • @joerockhead7246
    @joerockhead7246 2 года назад +3

    Thanks, David, & Chris. This was great. Would love to see a lot more from Chris. BTW @ 53:20 is how I enter my passwords. :)

  • @nghiaduy6044
    @nghiaduy6044 2 года назад

    Thank you guys for keeping on this great series!!

  • @jeevespreston
    @jeevespreston 2 года назад +1

    Still learning WS, very enlightening, thanks so much!!

  • @hamada99457
    @hamada99457 2 года назад +2

    Thanks both of you guys we need more videos on Wireshark I'm a NOC Engineer and I really want to add Wireshark to my skills as we know Wireshark helps you a lot if you know how to play with it I will join Chris Greer course maybe I will find what I'm looking for.

  • @Fz3r0_OPs
    @Fz3r0_OPs 2 года назад

    Thank you very very much David and Chris, this series of videos of Wireshark are so usefull for me. Thanks to both for sharing your knowledge, greetings from Riviera Maya :)

  • @shaan885
    @shaan885 2 года назад +1

    Like always great contents! Thanks to you both for this WS series and many more. ❤😊

  • @androidandroid1631
    @androidandroid1631 Год назад

    High David and Chris, thanks a lot for the TCP Deep Dive series. It helped a lot to start find network problems with Wireshark. As always it is hard to find the needle.

  • @upendrasingh2390
    @upendrasingh2390 2 года назад

    I always love to watch your channel. Every time learn new things 😃

  • @szali923
    @szali923 2 года назад

    Great video. Love these in depth videos about Wireshark with Chris. Keep them coming, and thanks.

  • @abylaurancecherian4930
    @abylaurancecherian4930 2 года назад +1

    Thanks for the wonderful session David & Chris... Looking forward for the war room sessions as well.

  • @niravchauhan2278
    @niravchauhan2278 2 года назад

    Great session.👍✌️Thank you David && Chris

  • @Ranjeet_88
    @Ranjeet_88 Год назад +3

    Chris is a legend. you got to appreciate david here, even though he knows things that Chris misses sometimes he gently remind him that as a question and doesn't try to show off. Have observed this with lot of guest, quality of a great host and something we could learn. keep bringing such content David. thank you

    • @ervinr82
      @ervinr82 Год назад

      He stirs the pot. In a good way.

  • @erothwell
    @erothwell 2 года назад

    Loving the team ups w/ Chris. I’m learning so much and subscribed to his channel too.

  • @MrBitviper
    @MrBitviper 2 года назад

    awesome content as always and and it's always great to see content from chris
    btw you're getting pretty close to 1 million subs David
    hope you get there real soon

  • @ThePumbaadk
    @ThePumbaadk 2 года назад

    Thanks Chris and David, real-time scenario would be fun to see

  • @carlosc3260
    @carlosc3260 2 года назад

    Massive thanks guys! Brilliant examples. Looking forward to more stuff in this format. That “war stories” sounds great too 👍🏼

  • @jerrygawlicky8859
    @jerrygawlicky8859 2 года назад +3

    Hey David I was watching the TLS run down you did with the other SME on encryption and TLS communication. However... I noticed something in my analysis and following along with the video.,. I am gonna circle around to it today and take a second glance.. maybe check my f5 it may be effecting the handshake but.. for sure no certificate and or server done packets were within my tls handshake... just wanted to give you a heads up. Maybe they were encrypted or modified i haven't looked yet.. but none the less great stuff man... and chris is the man when it comes to wireshark and analsysis at the deep packet level. His shark fest tips have helped me identify many problems.. in the real world.
    Keep up the awesome freedom of knowledge you guys give and dont charge for :)
    Cheers!

    • @ChrisGreer
      @ChrisGreer 2 года назад

      Thanks for commenting! Glad the content is helping you in the real world. 👍

  • @PowerShorts-
    @PowerShorts- 2 года назад

    I am teaching myself to pursue a career in cyber security. This is pure gold thank you so much!

  • @Mike.Kachar
    @Mike.Kachar 2 года назад

    David / Chris;
    I love these Wireshark videos you've been doing. Even tho a lot of it I've already picked up on my own, just by running pcap's working as a Sec Analyst in PCI, there's still a bunch of stuff that I've learned watching these videos.
    Please oh please...KEEP 'EM COMING!
    You rock, @Chris Greer - thanks!!

  • @Pursuitdnb
    @Pursuitdnb 2 года назад

    This is awesome David! This could have saved tons of time and headaches in the past!

  • @Mbro-dq2do
    @Mbro-dq2do 11 месяцев назад

    Great video. Big props to Chris. I always thjought he was observing TShark on Linux using a wifi usb adapter plug in which you can. But i didnt know I could install it natively on my Dell AND my Macs without using my Linux oS. Now I can see real info and really read serious traffic. I was never seeing any ip's or anything. just a bunch a minor AP traffic. Color codes never came up but now holy shit thee amount of traffic that colorized is nuts. I can finally see what my own personal traffic looks like on the wire. LOVE these videos on TShark with chris. Thank you so much David

  • @tahersadeghi6773
    @tahersadeghi6773 7 месяцев назад

    Thank you, David and Chris.

  • @dhakalmanish
    @dhakalmanish Год назад

    Thank You David and Chris! Great Video

  • @MeMyselfAndBob
    @MeMyselfAndBob 2 года назад +2

    Great video David! I've learned a lot, over and over again! Chris is a fantastic teacher. And yes, I can't wait to hear those war stories you've got Chris.

  • @CyberxploitHausa
    @CyberxploitHausa 2 года назад

    You nailed it David. Thanks for sharing these type of people to the community. ♥️🇳🇬

  • @MrEric377
    @MrEric377 2 года назад

    I have supported apps that others have built and you are 100% right. It is always the network fault as both the support personal and app developers don't want to be blamed (2 to 1). I have tried to use Wireshark in the past, but just too much info and not enough understanding. I have seen co-workers point at a random lines in Wireshark and say oh that is a network issue, but couldn't explain or prove why they know it is a network issue. For the un-trained (Like me) Wireshark is a 2 way street as it could lead to the wrong path. It is always refreshing to see how a professional packet analyst can look and filter Wireshark and (with little knowledge of the app in question) can articulate what is going on and give a reasonable path forward. Amazing, I love this discussion.

  • @rohanmahakal8113
    @rohanmahakal8113 2 года назад

    Worth watching saved so much of time figuring out certain things in WS.

  • @techlearner4806
    @techlearner4806 4 месяца назад

    49:53 Great question David. I was thinking about this question since Chris started with HTTP. Many thanks for this absolutely must question.

  • @akshaypotdar1840
    @akshaypotdar1840 2 года назад

    Thanks David for all your work and the free infomraiton you provide. Could you do a video on industrial networks profinet, EtherntIP etc., from network security point of view, please?

  • @viv_2489
    @viv_2489 Год назад

    This is class and great tutorial.. Chris is master of his craft

  • @Sycophantichallenger
    @Sycophantichallenger 2 года назад

    Can't wait for the next in the series. As the "computer guy" at a retail store with really old crap infrastructure I could really use some pointers with narrowing down what is or is not happening that is impacting the network performance.

  • @dezejongeman
    @dezejongeman 2 года назад

    this is GOLD!!!! War stories are awsome and gets insight on how to jump into issues. slowness is the hardest.

  • @paulmacgiollacaoine8619
    @paulmacgiollacaoine8619 2 года назад

    Fantastic video, thanks guys !!!

  • @terexkiller3847
    @terexkiller3847 2 года назад +1

    Thanks, I love your content. Keep it up

  • @MisterV..
    @MisterV.. 2 года назад

    I love to learn Wireshark. Very great video. Thanks

  • @DimitriPappas
    @DimitriPappas 2 года назад

    As a sysadmin/netadmin by trade, one skillset I've really neglected is packet capture/inspection as a means for troubleshooting & debugging or simple forensics. I normally rely on tools like Mikrotik's packet sniffer to get some basic information but this is clearly the better way to dive in and isolate the problem. Seeing all the encrypted hex traffic and mystical headers and protocols in Wireshark can be very intimidating, but the application itself seems very user-oriented and the filtering logic is very intuitive. This video has definitely sparked some interest in spending more time with wireshark as it's definitely going to be a skillset worth any effort and frustration in the learning curve, as it will save great deals of time (and probably money) in the long run. Thanks gents for the great content

    • @ChrisGreer
      @ChrisGreer 2 года назад +1

      You hit it Dimitri! Packet skills are very worth investing the time into.

  • @Bold1c1u
    @Bold1c1u 2 года назад

    You and your guests are the best. i learn so much stuff about the networking field in a fan and entertaining maner.

  • @CK-ck9ut
    @CK-ck9ut 2 года назад

    Chris is one of the nicest most helpful individuals I have ever contacted.

  • @dden-qz8ym
    @dden-qz8ym Год назад

    This is very good stuff. Please keep it up.

  • @majiddehbi9186
    @majiddehbi9186 2 года назад

    Great initiative as i said knowing wirshark is so importante thx Mr Bombal, Chris is awesome with his claire explanation i love this topic

  • @thedoubleop
    @thedoubleop Год назад

    Incredibly helpful video!

  • @dandele123
    @dandele123 2 года назад

    this video is fantastic, would love to hear more about wireshark and war stories from Chris

  • @lucaspascual5956
    @lucaspascual5956 2 года назад +1

    Pure gold as always.

  • @rolandoa.valenzuela2756
    @rolandoa.valenzuela2756 2 года назад

    Awesome video! Another overview of wireshark and fragmentation (usually over VPNs) would be awesome!

  • @debarghyadasgupta1931
    @debarghyadasgupta1931 2 года назад

    It's killer content as always. Thanks David & Chris. Respect

  • @jeroenvandervelden7318
    @jeroenvandervelden7318 Год назад

    Great Tutorial! Would love to see a full Wireshark one on slow wifi debugging please!

  • @Odim65
    @Odim65 Год назад

    DAVID amazing content as always with Chris. If it is possible if you guys can make DNS deep dive and troubleshooting with Wireshark, especially those related to active directory.

  • @soma972
    @soma972 2 года назад

    Thank you very beaucoup !!
    And the chapters is very useful.

  • @TastyChickenLegs
    @TastyChickenLegs Год назад

    This guy is amazing. The amount I learned in this one video is pretty amazing. Thanks

  • @bboosss1065
    @bboosss1065 2 года назад

    amazing content
    Much appreciated

  • @lewis5754
    @lewis5754 2 года назад

    Thanks for the great presentation Chris and David. Really useful. Would love to hear some war stories!

  • @oscarbaltazar7753
    @oscarbaltazar7753 Год назад

    Excellent content gentleman!

  • @alejandrorodriguez3771
    @alejandrorodriguez3771 2 года назад

    This is what I was hoping from a long time ago.

  • @taokichavez9319
    @taokichavez9319 Год назад

    amazing content thanks for sharing

  • @Delijohn
    @Delijohn 9 месяцев назад

    Chris Greer is amazing! Thanks for this!

  • @barkataligulzari6516
    @barkataligulzari6516 2 года назад

    Thanks David and Chris. Yes to War story

  • @Gunslinger088
    @Gunslinger088 2 года назад

    Great guy Chris.

  • @3004Marbles
    @3004Marbles 2 года назад

    Nooooo! That cliffhanger was brutal!
    Can't wait for the next part. I want to know all about those war stories!

  • @toromac9786
    @toromac9786 2 года назад

    I recently had to use Wireshark at work - had no idea what I was doing (still don't) but think this should prove helpful
    (Trying to track down Rx Length errors)

  • @delyansivchev5155
    @delyansivchev5155 2 года назад +1

    Very interesting lecture,.... Would be really useful though as continuation to have some inside tips about how to stitch packet traces/packets inside traces taken from different parts of the network and endpoints with focus on TCP sequencing and session stitching between those different captures - as most of the time to prove the point of application or network issue it is often needed to take packet traces on network devices too.

    • @ChrisGreer
      @ChrisGreer 2 года назад +1

      I really like this suggestion. Noted!

  • @JJ-nv3tv
    @JJ-nv3tv 2 года назад

    Really good info here, some I use already quite a bit. Wish they cleaned up the audio on this though

  • @wylie500
    @wylie500 Год назад

    Great video!!

  • @denniessundia1912
    @denniessundia1912 2 года назад

    Nice content...well explained. Especially the part where network guys were exonerated. Would you find a pcap to show how to prove its the application/server that has the lag. I would be helpful...

  • @ICOFRITE
    @ICOFRITE 2 года назад

    David asks all the right questions

  • @nix8960
    @nix8960 2 года назад

    Awesome, thanks a lot

  • @ivankovrm
    @ivankovrm 2 года назад

    Super nice content, keep it up!

  • @MK-jf1rv
    @MK-jf1rv 2 года назад +1

    Great content👍 Thanks for coming back to networking in between we lost you David🙏🥰🥰

    • @davidbombal
      @davidbombal  2 года назад +2

      Thank you. I will never forget networking 😀

    • @MK-jf1rv
      @MK-jf1rv 2 года назад

      @@davidbombal Thank you🙏🥰🥰

    • @ontrucktoit6166
      @ontrucktoit6166 2 года назад

      I think I know what you mean, but on the other hand networking is everywhere :)

  • @nepsky
    @nepsky 2 года назад

    What are the best filters to find the Network latency ? Please advise!

  • @homayounshokri5041
    @homayounshokri5041 2 года назад +2

    Great , informative and practical as usual
    Can you make video on IPsec and IKE like tlss handshake one from almost two weeks ago?

  • @zubairzonbarkar3358
    @zubairzonbarkar3358 2 года назад

    This was amazing
    Can we get to see deep dive in ssl(tls) and ssh

  • @depon91
    @depon91 2 года назад

    I was checking your video about wireshark early today and now here is the other one

  • @keratishvili
    @keratishvili 2 года назад +1

    Hey David could you make networking observing for ebpf systems?

  • @cyphodias1640
    @cyphodias1640 2 года назад

    Thanks again David and Chris for the incredible information. I’m also a yes please to a war stories video. 👍

  • @riflemangramps5014
    @riflemangramps5014 2 года назад

    great love it let have more

  • @Xotty
    @Xotty 2 года назад

    Love to watch Chris. Learning an awful lot. And yes, please do a "war stories" video :)

  • @PraveenRai
    @PraveenRai 2 года назад

    It would be good if attach the pcap for side by side analysis

  • @davidbombal
    @davidbombal  2 года назад +24

    You are guilty until proven innocent! The network is slow! But is it actually a network issue? Or is it an application issue. Chris Greer explains.
    // MENU //
    00:00 ▶ Introduction
    00:26 ▶ Intro
    00:35 ▶ Wireshark filters introduction
    02:20 ▶ Regular IP filter
    05:28 ▶ Common filters
    07:10 ▶ Operators in filters
    08:19 ▶ Where to get the filter Power Point
    08:55 ▶ Filter shortcuts
    11:20 ▶ Filter buttons
    12:10 ▶ TCP analysis flags
    15:16 ▶ Filter buttons (cont'd)
    17:15 ▶ TCP reset
    18:35 ▶ How to apply filter as display filter
    20:08 ▶ Experience vs Theory
    22:19 ▶ Special filters
    29:00 ▶ Time filters
    38:22 ▶ Consulting scenario
    49:45 ▶ HTTPS consulting scenario
    55:33 ▶ Other filters
    56:46 ▶ How to simplify p-caps
    59:29 ▶ Signature filters
    01:01:39 ▶ Quick recap
    01:02:16 ▶ Conclusion
    // MY STUFF //
    www.amazon.com/shop/davidbombal
    // SOCIAL //
    Discord: discord.com/invite/usKSyzb
    Twitter: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    RUclips: ruclips.net/user/davidbombal
    //CHRIS GREER //
    Udemy course: davidbombal.wiki/chriswireshark
    LinkedIn: www.linkedin.com/in/cgreer/
    RUclips: ruclips.net/user/ChrisGreer
    Twitter: twitter.com/packetpioneer
    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com

    • @YouTubeKing506
      @YouTubeKing506 2 года назад

      Please say how much time it takes to crack wifi password with hashcat brude force'. -a

    • @johnwesley256
      @johnwesley256 2 года назад

      Great Video! Most of my DDOS attacks come from TCP. Also a lot of malware and virus's I've caught come from directX JavaScript and Java which usually comes from ads. You don't even need to click the ad, it just needs to load on your browser

    • @hareshsingh3144
      @hareshsingh3144 2 года назад

      please upload short videos max 30min

    • @jeevespreston
      @jeevespreston 2 года назад

      In my world we call that MTTI, Mean Time to Innocence!! it's always the network, until you prove that it's not...

    • @PowerShorts-
      @PowerShorts- 2 года назад

      Can you please please have him look at malicious activity.

  • @johnwesley256
    @johnwesley256 2 года назад

    A decade ago I was using WPE for my filtering which was great because it targeted an individual application. Now uh days browsers and many other apps use multiple processes so it's not practical 2day. In programming = would be to set a value to a variable. == Means "is equal to". === Means "is exactly equal to" usually for Case Sensitive issues. I'm thinking these are the same. War stories are great!

  • @dinohunter7176
    @dinohunter7176 Год назад

    == is like a standard in programming to check if values match on value
    if used just one = then mean assigna valuea to that variable, not sure if possible in Wireshark

  • @jerrygawlicky8859
    @jerrygawlicky8859 2 года назад +2

    Chris.. You guys should setup a lab with eve ng and simulate congestion and show how the congestion notifications work and how the window size works both in a compatible setup with ecn and ecw and one without the capability... and let me know if you guys do :)
    Would love to be a part of it or follow it.

    • @ChrisGreer
      @ChrisGreer 2 года назад

      That is a great idea. Actually I was thinking it is time for an example with ECN.

  • @DaveRx
    @DaveRx 2 года назад

    This is great

  • @gjkrisa
    @gjkrisa 2 года назад

    Oddly this came out when I was searching to see why dsl connection is slow or drops. I’m pretty sure it’s upload hogging the bandwidth but I would like to make a graph as to what going up slows how much going down. There is a point that I can see upload device stays on network and continue upload but everyone else will show no internet so may drop its self from the network like windows will do sometimes

  • @alejandrorodriguez3771
    @alejandrorodriguez3771 2 года назад

    Hey, great videos, keep going. Of course, war histories would be very nice because is real world examples, its almost real world work expriences

  • @JonMajorCCIE47884
    @JonMajorCCIE47884 2 года назад

    I came here for a casual watch, but as with every freaking Chris Greer video, here I am taking notes.

    • @ChrisGreer
      @ChrisGreer 2 года назад +1

      Really glad you like the content Jon! Thanks for the comment.

    • @JonMajorCCIE47884
      @JonMajorCCIE47884 2 года назад

      @@ChrisGreer no sir, thank you lol. I’ve taken to recommending everyone on my team watch your content.

  • @WilverSanchez-nb8sw
    @WilverSanchez-nb8sw Год назад

    Yes to war stories! Looking forward to watch the video!

  • @neilsachy
    @neilsachy Год назад

    Great video amamzing as usual. Could someone help though I have wireshark version 4.0.2 and it doesnt seem to like the frame contains filter

  • @outerheaven01
    @outerheaven01 Год назад

    Yes! War stories and a run down on the profile on Chris Wireshark (specially the buttons he has)

  • @adnaneabid7274
    @adnaneabid7274 7 месяцев назад

    I think the double equal or === to compare the type or the value, like in JS maybe.

  • @davidmendoza6768
    @davidmendoza6768 2 года назад +1

    I'd love to hear the war stories!