Cybersecurity for Beginners: How to use Wireshark

Поделиться
HTML-код
  • Опубликовано: 4 фев 2025

Комментарии • 196

  • @steventelfer8186
    @steventelfer8186 9 месяцев назад +76

    Wireshark is one of the most important tool in IT. Mastering this tool is such a great advantage. Thank you!

  • @Adam-ey2jc
    @Adam-ey2jc 9 месяцев назад +31

    I have always wanted to learn more about Wireshark but felt imitimidated by it but this video does a good job of breaking down some of the confusion around it. Modern computers are so complicated! I would love to see more videos about Wireshark or of this nature.

  • @Embbrr
    @Embbrr 6 месяцев назад +1

    Would love more videos like this, I was struggling with learning a lot of protocols for my IT program I am in, and this video was explained perfectly, The examples on screen were very easy to follow, and your approach to explaining how exactly things worked was very easy to follow, need a full series like this, from Zero to Hero! Great job honestly.

  • @RealitySetsIn
    @RealitySetsIn 9 месяцев назад +7

    Yes, great video. I'm in cybersecurity program in college and so far I'm doing the general studies but I can't wait to get into the cybersecurity stuff like this.

  • @TheRoot2944
    @TheRoot2944 6 месяцев назад +1

    Going back to school for cyber security and studying for sec+ and cysa+ you have been very helpful

  • @_Garm_
    @_Garm_ 9 месяцев назад +26

    really intersting tutorial, would love to see more wireshak tutorials! :D

  • @shackcf
    @shackcf 9 месяцев назад +3

    Been using Wireshark on personal PC for years. While working it was Network Instruments that was pre-2009. Thanks for the videos.

  • @CoderSal-XIII
    @CoderSal-XIII 8 месяцев назад +2

    Wireshark is such an important tool. I use it all of the time both at work and at home. Such a great tool. Good video for beginners.

  • @AtomicElectronCo
    @AtomicElectronCo Месяц назад

    Thank you for a straight up start to this tool. Shows the basics of how to get in there and how it's used by focusing on specific things one might be looking for, strings, ports, specific apps or sites. Great place to start. Thank yoU!

  • @Plazmal
    @Plazmal 9 месяцев назад +68

    I've always liked using Wireshark to monitor connections from other devices a like IoT devices etc. It's super useful for that.
    Good video as always.

    • @regisegek4675
      @regisegek4675 9 месяцев назад +2

      Indeed

    • @DudeWhoSaysDeez
      @DudeWhoSaysDeez 8 месяцев назад

      Can you monitor all traffic on your network from just one computer?

  • @SyberPrepper
    @SyberPrepper 9 месяцев назад +6

    Thanks for the video. Would love to see more Wireshark instructional videos. You do a great job of simplifying complexity.

  • @faithtechnology3542
    @faithtechnology3542 6 месяцев назад +1

    hey just wanna tell you that you are a great guy these videos are so easy to understand

  • @FakeJeep
    @FakeJeep 9 месяцев назад +10

    Very simple and straight forward tutorial.

  • @urik7793
    @urik7793 9 месяцев назад +1

    Just a note at the beginning you can select multiple network adapters by holding CTRL as well.

  • @joepjoep9531
    @joepjoep9531 9 месяцев назад +7

    Good video for absolute beginners

  • @davidbell7094
    @davidbell7094 9 месяцев назад +4

    Excellent info picked up,through this video. Yea I'd love too see some more videos like this,is good too understand more of what it all means,cheers buddy!

  • @damianpodgorski6977
    @damianpodgorski6977 9 месяцев назад +2

    Loved the video, simple and powerful! Hope more to come on wireshark

  • @random-user-in-yt
    @random-user-in-yt 9 месяцев назад +9

    Good tutorial but I think you miss a important point for some people who can not see any readable DNS query. If DNS query is encrypted(maybe by HTTPS), WireShark can not capture those DNS query in readable string.

  • @ttrqs
    @ttrqs 9 месяцев назад +8

    been waiting for a vid like this, ty

  • @wannabedal-adx458
    @wannabedal-adx458 9 месяцев назад +17

    1) More content on Wireshark would be great (aka Tutorials).
    2) How much does Wireshark cost?

    • @Taffy84
      @Taffy84 9 месяцев назад +9

      It's free

    • @squirlmy
      @squirlmy 8 месяцев назад +2

      Open Source and free forever, unlike for example Metasploit, which is partly open and partly with proprietary upgrades.

  • @jaycolife2314
    @jaycolife2314 9 месяцев назад

    I’m interested in computer science and how they connect with the world. It’s fascinating but intimidating and overwhelming.. I subscribed hoping you’ll put up more content like this. Break it down for us..

  • @HazexDimond
    @HazexDimond 9 месяцев назад +1

    great stuff 👍 many useful cases for this tool
    last time i used it was to check my dns traffic to make sure it was all configured/encrypted correctly
    for a deeper dive, chris greer has some good wireshark content on youtube, explains filters well

  • @xbeast7585
    @xbeast7585 9 месяцев назад +1

    Thank You So Much For The Video Sir Please Make More Videos On How To Use Wireshark 💓✨

  • @wissy006
    @wissy006 9 месяцев назад +3

    I liked the video, it was very interesting thanks Leo😄❣️

  • @rdsii64
    @rdsii64 9 месяцев назад +1

    An interesting video subject would be on what to do when you find your computer connecting to places you don't want it to.

  • @codydietrich4246
    @codydietrich4246 9 месяцев назад +2

    Well done. Super easy to understand!

  • @Alchemetica
    @Alchemetica 9 месяцев назад +4

    Yes please, Leo, more videos like this one. Thanks as always.

  • @bernieoldham7580
    @bernieoldham7580 9 месяцев назад +1

    enjoyable video ,thank you . one question how do we stop the spyware. a video on how to turn it off, individually would be most welcome . 🙂

  • @ao4514
    @ao4514 9 месяцев назад +1

    Hello Leo, many thanks for a great content as always.
    Would you ever consider doing a content on how to use Wireshark for hunting malware?!

  • @gyl9735
    @gyl9735 5 месяцев назад

    I like the way you explain it and it is really helpful!!! thanks

  • @buraduri
    @buraduri 9 месяцев назад +219

    This video seems like it's missing an important part of the usefulness of wireshark. How do I identify what I don't know what I'm looking for? No shit if I connect to youtube I'll see youtube but what about unrecognized connections from potentially malicious software on my PC

    • @joepjoep9531
      @joepjoep9531 9 месяцев назад +58

      You have to look at this differently it’s made for people who never used it before you can’t start somewhere in the middle or very complicated if you are learning something new

    • @pcsecuritychannel
      @pcsecuritychannel  9 месяцев назад +141

      Wireshark is an investigative tool, not anti-malware. If you want a quick and easy way to detect malware, this isn't it.

    • @seansingh4421
      @seansingh4421 9 месяцев назад +29

      In that scenario you would wanna look for network connections involving unusual ports, so lets say you have a typical Windows home edition PC, but you spot a some random executables (Apps and .exe) successfully connecting via Port 22, Port 3389 BUT you don’t even have Remote Desktop feature because that’s unavailable in Home editions. This is just one example and trust me this can be a rabbit hole of being over suspicions but this is one example of an outbound C&C connection

    • @johnsmith1953x
      @johnsmith1953x 9 месяцев назад +12

      @@pcsecuritychannel Sounds like an opportuniy for something AI to "sit" on top of wireshark and do this.

    • @d1m18
      @d1m18 9 месяцев назад +2

      @@pcsecuritychanneldo you recommend any tools for this?

  • @vaclovas-art
    @vaclovas-art 9 месяцев назад +1

    DNS can be also encrypted using DNS over TLS or DNS over HTTPS. So than you cannot see any DNS requests which was made. ISP also cannot see it 😊

  • @GustavoMsTrashCan
    @GustavoMsTrashCan 9 месяцев назад +2

    Thank you for this wonderful tutorial!

  • @muhammadsalmanafzal9396
    @muhammadsalmanafzal9396 9 месяцев назад +1

    would love a more deep dive to understand what other kinds of network requests are being made if a malicious software is installed.

  • @TheRealWillM
    @TheRealWillM 9 месяцев назад

    I don't know if you do this already but maybe create a 'related series' as an aside to the main thrust of the channel. Anyway those are my thoughts and content like this is very useful for 'dipping' the toe in, which may be useful down the track.

  • @priyojitdeb1891
    @priyojitdeb1891 9 месяцев назад +2

    Thanks, this was really informative!

  • @bretjohnd.morales9310
    @bretjohnd.morales9310 9 месяцев назад +1

    Now I know you have a website. =) Glad to know.

  • @x9v8k
    @x9v8k 9 месяцев назад

    Yes, please do more videos to add on this one (advance). Is there anything further to see if the connections are not easily identifiable?
    Is there a way to pinpoint a remote connection quickly?

  • @therealmrarchive
    @therealmrarchive 6 месяцев назад

    links to amazon popped up when I tested wireshark on my own personal computer.
    Shoved the link in a url blocker. No more amazon lol X D

  • @VentelHD
    @VentelHD 7 месяцев назад

    I collected all ad urls and added them to my hosts file. Can now browse anyplace without background ad data exchanges without consent.

  • @peterwassmuth4014
    @peterwassmuth4014 9 месяцев назад +1

    Totally awesome! Thank you for Sharing! 💯✴

  • @Jerry-vt4zf
    @Jerry-vt4zf 9 месяцев назад +1

    You need to do a video, kaspersky vs malwarebytes premium

  • @giausjulius4
    @giausjulius4 6 месяцев назад

    Maybe we would go more in depth on this software sometime? What do the colors mean, if anything? How do you really determine what is and isn't a good IP once you see something you don't recognize? How do VPNs interact with and change the packets you see? Stuff like that.
    I'm just getting into the whole cybersecurity scene. Although I've been careful since the days of Limewire to never click links, ads, and to distrust anything I see in emails, etc, I haven't ever really been big in actually finding out what goes wrong in the system and network. I visit the same sites that I've always gone to. But I find myself wondering if somehow they are getting in anyway even if I've been careful just by little things I notice happening on my PC once in a while such as the CMD window opening for just a moment and disappearing, a game minimizing to desktop with no input, etc. These coupled with data leaks from big tech leaking email, account info, and so on.
    It's probably totally benign and I'm being paranoid but you never know.

  • @TheTitaniumSkull
    @TheTitaniumSkull 9 месяцев назад

    This reminds me of back in late 90s early2000s there was a free app (can’t remember name) that backtracked incoming pings.

  • @mahamadousimpara4320
    @mahamadousimpara4320 7 месяцев назад +1

    I want to see the entire on my network not just for my computer!!!

  • @username_0_0
    @username_0_0 7 месяцев назад

    i love your desktop wallpaper. Please share downloadable link to download the same wallpaper.

  • @UserforPhone
    @UserforPhone 9 месяцев назад +1

    I am very curious about why there is no option to have a professional packet capturing software like Wireshark for mobile/Android?

  • @miltonthecat2240
    @miltonthecat2240 9 месяцев назад +1

    I would like to snoop on WiFi traffic to the various WiFi-enabled devices that are proliferating in my house. This is mostly a curiosity, but I expect there will also be surprises, some perhaps concerning. I've been told that I can use Wireshark to do this, but I need to add a separate dedicated WiFi interface on my PC that supports "promiscuous mode". I found some trailing edge WiFi dongles that are supposed to support promiscuous mode, but I also need a compatible driver. This is where I have hit a dead-end, as I have been warned that the drivers for these trailing edge WiFi interfaces often have embedded malware, and I don't have a sacrificial PC available to dedicate to this effort.
    Any light you can shed on this in a future video would be of interest to me.

  • @stephie3206
    @stephie3206 9 месяцев назад +2

    Merci 😊😊😊

  • @shinigamirenegade
    @shinigamirenegade 9 месяцев назад

    Not going to lie if you start using Wireshark and if you have familiarity with osi model like layer with layer 3 routers packets and layer 2 switches frames then it's not bad at all. To read the traffic and knowing udp tcp protocols you're golden. I think I need help with adjusting ethernet adapter into promiscuous mode and the other mode. And what's the functionality.

  • @Isazeledon19
    @Isazeledon19 2 месяца назад

    The most useful video, thnaks

  • @HaveanOreshnik
    @HaveanOreshnik 9 месяцев назад +1

    this is a tool that is great for checking if your computer has been RATTED right?

  • @Holycurative9610
    @Holycurative9610 9 месяцев назад

    Portmaster and winaero tweaker are my ho to programs for shutting down telemetry.

  • @coisasnatv
    @coisasnatv 9 месяцев назад

    My Gigabyte GA-990FXA-UD5 R5 motherboard connects to the internet in the middle of the night after I turn it off.

    • @zapa1pnt
      @zapa1pnt 9 месяцев назад

      If Windows, go into settings and turn off "wake on LAN".

    • @coisasnatv
      @coisasnatv 9 месяцев назад

      ​@@zapa1pnt Is disabled. By the way, the motherboard does this without a hard drive attached. It turns itself on in a kind of low-power mode and connects to the Internet.

    • @zapa1pnt
      @zapa1pnt 9 месяцев назад

      @@coisasnatv: Well, if you can't find it in the BIOS, you will need to unplug it, after shutdown. 😁✌🖖

    • @coisasnatv
      @coisasnatv 9 месяцев назад

      @@zapa1pnt I already do. But how many people don't know? How many people are affected by this? Gigabyte is famous for doing this, google the topic and you will see that Gigabyte has been caught with his pants down more than once doing exactly the same thing.

  • @ZephniStrife
    @ZephniStrife 8 месяцев назад

    I don't know why but my instant reaction to something like this is: How can I trust it?
    As it could quite easily see current webpages you are on or applications you're typing passwords into, and then hide its ip: protocol transaction with a server... but it's probably fine 👀

  • @HabeebSule
    @HabeebSule 8 месяцев назад

    This is an awesome video thanks.

  • @AcvaristulLenes
    @AcvaristulLenes 9 месяцев назад

    What to do to get rid of the 12 or so UAC notification whenever we start Wireshark?

  • @alberts6096
    @alberts6096 2 месяца назад

    there should be a function in wireshark make a image of all connection, install software, make image again and compare.

  • @MrBeeytube
    @MrBeeytube 9 месяцев назад +1

    Great video!

  • @yt4me2lurn
    @yt4me2lurn 3 месяца назад

    Hi, once you see the packets that show the sites you may not want, can you block those or will they just keep communicating each time you go to that site ?

  • @Ulfeneimer
    @Ulfeneimer 9 месяцев назад

    That Wallpaper look sick!
    Where did you get it? @The Pc Security Channel

  • @denizorsel1029
    @denizorsel1029 8 месяцев назад

    Skoda octavia is not that bad if you are still looking into it =)

  • @darksphere4679
    @darksphere4679 3 месяца назад

    i took an entire. class in community college on wireshark, and i was afraid of it after this class. but now. not so much

  • @fiefieviolet
    @fiefieviolet 8 месяцев назад

    This is so complex, its like a programming language. I initially thought it was just gonna be a program that detects and blocks everything

  • @KirenKK-te7pb
    @KirenKK-te7pb 8 месяцев назад +1

    Wireshark has to be a " backdoor" to catch " backdoor entries " too. The ethics of the admin of any empowerment matters as much as the expected service😅!

  • @blueyhis.zarsoff1147
    @blueyhis.zarsoff1147 9 месяцев назад

    How about an app for a phone and firewall to block outgoing requests?

  • @johnduty4505
    @johnduty4505 8 месяцев назад

    What about reading the cap file...how can that be done?

  • @tuttoaposto4011
    @tuttoaposto4011 8 месяцев назад

    Does Wireshark show only the activity on the computer it’s downloaded to, or the LAN the computer is part of?

  • @kaeez
    @kaeez 9 месяцев назад +2

    What browser are you using?

  • @PaddyPatPatrick
    @PaddyPatPatrick 9 месяцев назад +1

    Hello Everyone, From The UK👋

  • @markhutchinson8760
    @markhutchinson8760 9 месяцев назад

    Yes, more vids like this!

  • @eaudesolero5631
    @eaudesolero5631 5 месяцев назад

    is there a browser that does not make any queries to any links until i actually click on it? it simply puts a place holder, the link...

  • @timchalmers1700
    @timchalmers1700 8 месяцев назад

    Cool. Thanks!

  • @pipjersey8303
    @pipjersey8303 9 месяцев назад

    i dont see that much DNS listings on mine, just a couple from kaspersky, maybe it didn't install right?

  • @MrScoodles
    @MrScoodles 6 месяцев назад

    I see my private IP address sending and receiving HTTP requests from public IP addresses. Is this weird? Why isn't it my public IP address that is handling these requests?

  • @alleeadl289
    @alleeadl289 9 месяцев назад

    can you do us a favor and review costume os like tiny11, Ghost Spectre, windows x lite, from a security prespective many people want to use them.
    just give us a genral security test of them please. :(

  • @DarrelDinkem
    @DarrelDinkem 9 месяцев назад

    how would one check a hacked PC on this environment?

  • @ToecutterPA
    @ToecutterPA 9 месяцев назад

    How did you get it in Dark Look/Mode?

  • @Lossh2004
    @Lossh2004 9 месяцев назад

    is it normal to have remote desktop to be running in the background?

  • @gerry2345
    @gerry2345 8 месяцев назад

    Very good vid.

  • @GYTCommnts
    @GYTCommnts 9 месяцев назад

    My old Outpost Firewall used to show me similar information, separated by the apps (or component of the O.S.) which was generating the connection... Is there a tool for this or is there an option available on Wireshark for monitoring this? Or is only doable on firewalls?

    • @sauplink7975
      @sauplink7975 4 месяца назад

      To achieve what you were doing with Outpost Firewall-monitoring traffic per application or OS component-you can use Wireshark but with some limitations, as it primarily focuses on packet-level analysis rather than app-based monitoring. However, with the right filters, you can approximate similar functionality by analyzing traffic specific to certain processes or connections.
      Wireshark allows you to apply **display filters** to identify specific network traffic based on protocols, IP addresses, or ports, which indirectly helps monitor app activity. However, it does not directly show traffic sorted by applications unless you pair it with OS tools to map the process to network traffic. For more straightforward app-based monitoring, a dedicated firewall or monitoring tool like **PRTG Network Monitor** or **SolarWinds Deep Packet Inspection** might be more suitable【7†source】【9†source】.
      If you want a direct replacement for the Outpost Firewall's style of monitoring, consider using **NetFlow** or **Deep Packet Inspection (DPI)** tools, which can classify traffic by app category and offer more detailed insights into app-level connections【9†source】.
      If you still prefer Wireshark, combining it with system monitoring tools could provide a similar overview, but it will require manual filtering and linking to specific processes.

  • @ethimself5064
    @ethimself5064 9 месяцев назад

    Is Malewarebytes still poot for on the fly? I trust it is still great at scans

  • @bruceparker3139
    @bruceparker3139 9 месяцев назад

    hey , I wonder how MacOS handle this? can you do these on MacOS also?

  • @girl4632
    @girl4632 9 месяцев назад

    How to know about suspicious connection

  • @kimsena268
    @kimsena268 9 месяцев назад

    Waiting for eset smart security 17.

  • @WilsonPendarvis-tn3wm
    @WilsonPendarvis-tn3wm 8 месяцев назад

    I have little snitch. Not as deep as this, but it is powerful

  • @ImSimpIicity
    @ImSimpIicity 9 месяцев назад +2

    Thanks !!!!!!

  • @ZEDDIEZEDZED
    @ZEDDIEZEDZED 8 месяцев назад

    Good video

  • @justsumname
    @justsumname Месяц назад

    you'll understand wireshark much better if you fully understand the lower layers of the OSI model of networking

  • @jonmike9339
    @jonmike9339 9 месяцев назад

    This is why you need to be careful if you work from home.Only connect your work laptop to guest wifi

  • @CSGhostAnimation
    @CSGhostAnimation 9 месяцев назад

    Now if we could just firewall all traffic until I actually open google, or open my video game, then I would be happy

  • @Nunzio_77
    @Nunzio_77 9 месяцев назад +1

    Can you test Firewall of Avast Free? Thanks

  • @buzzbang9164
    @buzzbang9164 9 месяцев назад

    how to restart everything it does something watching my pc

  • @uzijoe
    @uzijoe 9 месяцев назад +2

    Better use Portmaster

  • @jkbobful
    @jkbobful 9 месяцев назад +1

    Shout out to Safing Portmaster it blocks a lot of this spying

  • @granturismo5917
    @granturismo5917 9 месяцев назад +1

    always there is a "tool" to...

  • @DrMatey215
    @DrMatey215 9 месяцев назад

    Cool!

  • @You_Could_Be_Next
    @You_Could_Be_Next 9 месяцев назад +4

    I'm sure my FBI agent has this task well in hand. For my safety, of course.

  • @Druid4026
    @Druid4026 9 месяцев назад

    the biggest question is are wireshark is safe to used it since all virus check website say have something on it?

    • @Holycurative9610
      @Holycurative9610 9 месяцев назад

      If you try to download a cracked version of any program it will come up as having a virus because of the software used to crack the program This is piracy and if you want the full version of a paid program then go pay them for it and you don't have false positives for virus alerts. Wireshark is free and used by a lot of people so it is very unlikely to come preloaded with a virus. I've just installed Wireshark and there are NO viruses at all...

  • @renkeyvd3924
    @renkeyvd3924 9 месяцев назад

    thanks