How to DECRYPT HTTPS Traffic with Wireshark

Поділитися
Вставка
  • Опубліковано 7 вер 2024

КОМЕНТАРІ • 382

  • @ganeshid1982
    @ganeshid1982 3 роки тому +40

    Thanks as always Chris... really useful 🙏

    • @ChrisGreer
      @ChrisGreer  3 роки тому +2

      My pleasure! Thanks for the comment Ganesh!

  • @numberiforgot
    @numberiforgot 3 роки тому +41

    Even after all the experience I have with IT security/forensics, I’m still learning something new every day.

    • @ChrisGreer
      @ChrisGreer  3 роки тому +3

      Amen to that Christopher! I feel the same. I learn something with every pcap I open.

    • @lovely31bluprint
      @lovely31bluprint 2 роки тому

      You will always learn something more in technology

  • @NovakGoran
    @NovakGoran 3 роки тому +12

    'Packet heads' cracked me up. Thanks for the vid!

    • @ChrisGreer
      @ChrisGreer  3 роки тому

      Glad you liked it! Hey every department needs a Packet Head.

  • @maliki14
    @maliki14 2 роки тому +3

    i havent touched cybersecurity in over a year but bet your ass stumbling on this video made me turn my PC back on, thank you for the insanely ez lesson

  • @techanalogies2629
    @techanalogies2629 2 роки тому +10

    A really interesting video indeed!...Learnt many new things....Could you make a video to learn how I can capture and decrypt my smartphone's browsing traffic using wireshark?(Both connected to the same networks)

  • @alexmook6786
    @alexmook6786 Рік тому +3

    Chris is a gem...I have learned so much from him over the years, especially on Pluralsight.

  • @scottspa74
    @scottspa74 2 роки тому +5

    I just experimented with this in a ucertify virtual lab I had open for a class assignment, and it was super easy and fun. Thank you for showing this !

    • @ChrisGreer
      @ChrisGreer  2 роки тому +1

      Great job! Thanks for the feedback!

  • @TheDyingFox
    @TheDyingFox 3 роки тому +1

    Nice to read online that this method apparently works the same with the Firefox web browser :D

  • @KaySwiss21
    @KaySwiss21 2 роки тому +2

    Glad you did the Collab with Bombal so I could find your content!

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      I am beyond honored that he wanted to interview me on his channel. Great to have you here!

  • @OmarAlpjaly
    @OmarAlpjaly 5 місяців тому +1

    🔴 Important note the variable name is "SSLKEYLOGFILE" not "SSLKEYLOG" as in the description

  • @ductran8118
    @ductran8118 3 роки тому +4

    Thank you for sharing! Now I can understand ssl/tls handshake clearly and how https works. Love it and Subscribed.

  • @thatpigeondude
    @thatpigeondude 2 роки тому +1

    finally... a video that works. I can't thank you enough dad.

  • @seantierney2028
    @seantierney2028 10 місяців тому +1

    Fantastic guide! I don't normally comment, but you need to know that you are doing fantastic work! I am experiencing Wireshark for the very first time in a CTF and this was clear, informative, and helpful!

    • @ChrisGreer
      @ChrisGreer  10 місяців тому

      Thank you for the comment! I really appreciate the feedback.

  • @sammyrajoy
    @sammyrajoy 3 роки тому +5

    Thank you for this video Chris, I was following the WCNA study guide book but got stuck when I didnt see what's in the book(HTTP). I realised the time gap between the date of book publishing and the current version of wireshark. So switched my trail to 443 and TLS. This video helped me decrypt my session.

    • @ChrisGreer
      @ChrisGreer  3 роки тому +2

      Great Samuel! Glad to hear that it helped. I'll get some more TLS 1.3 stuff out there soon.

  • @alexandermayerkirstein
    @alexandermayerkirstein 2 роки тому +2

    Remarkably excellent delivery style. Super efficient clarity. Nothing superfluous. Conceptual through point and click guidance. Compellingly engaging with constant forward quick-step momentum. Not too loud not soft spoken. Knowledgeable, conservative, passionate, trustworthy source. Technoratically enjoyable. First video I watched on this channel. Heading to check your other content for more of the same. Thank you!

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      Thank you for watching and commenting Alexander!

  • @mastoemoji
    @mastoemoji Рік тому +1

    Nice video. Could you do an other video decrypting UDP traffic 🙏 it will help us a lot, thanks

  • @mattdonnelly3743
    @mattdonnelly3743 2 роки тому +1

    Don't tell me this isn't the same guy as Darknet Diaries. The voice is IDENTICAL.

  • @bits4all770
    @bits4all770 10 місяців тому

    When I saw you change a hat I knew this lesson would be outstanding

  • @elieatia440
    @elieatia440 2 роки тому +2

    Thanks you for your great job. I try it and all it works fine!

    • @Vietquat114
      @Vietquat114 Рік тому

      it means we can decrypt any password even if it uses https protocol ?

  • @moinvohra5505
    @moinvohra5505 Рік тому +5

    Can somebody help me?
    I am not able to capture the log file even though I created an environment variable with the ssl.log in the end.

    • @VLif3
      @VLif3 5 годин тому

      Just restart the computer. It should work.

  • @bikupothen5426
    @bikupothen5426 2 роки тому +3

    how did u get that SYSLOG file in the beginning?

  • @shuvofahmid1705
    @shuvofahmid1705 Рік тому +4

    Thanks Chris. Would you mind sharing the process of path variable for log file in Kali Linux and MAC OS ?

  • @glorfindelironfoot2297
    @glorfindelironfoot2297 2 роки тому +1

    Thanks, Chris.

  • @nix8960
    @nix8960 2 роки тому +2

    Thanks a lot

  • @StarLightDotPhotos
    @StarLightDotPhotos Місяць тому

    Thank you for this. It was kicking my ass.

  • @ProliantLife
    @ProliantLife Рік тому

    You're a God amongst men sir. Thank you

  • @marlonrivas3413
    @marlonrivas3413 2 роки тому +1

    How do I enable Packet Reassembly and Uncompressed Entity Body?

  • @philipgeorgiev3240
    @philipgeorgiev3240 3 роки тому +1

    too cool for a dev, thanks

  • @TaraChand-ys8yd
    @TaraChand-ys8yd 2 роки тому +2

    can you please create a video for decrypting tls traffic in wireshark using private key file

  • @Leafspine
    @Leafspine 3 роки тому +4

    Мужик,лайк тебе ставлю,полезно очень 👍

  • @joshsalmon5782
    @joshsalmon5782 2 роки тому +2

    Im so confused. The file that you gave wireshark is completely different from the sslkeylog file that you made earlier. How did you create the file that you gave wireshark?

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      Hey Josh - I probably had to recreate it and share a different one. However the pcap and syslog you get in the link go together and the rest of the video steps are the same.

  • @scottsparling2591
    @scottsparling2591 2 роки тому +2

    You explain so much more clearly and succinctly than my packet analysis instructor. This is great! Thank you.

  • @jiillescas
    @jiillescas 3 роки тому +2

    Great video, please keep sharing more

    • @ChrisGreer
      @ChrisGreer  3 роки тому

      Thanks for the comment! Working on more content and I'll get it out there.

  • @__Bla__
    @__Bla__ 2 роки тому +1

    That’s really interesting!

  • @sherazhussain8247
    @sherazhussain8247 3 роки тому +2

    Thank you Chris!

  • @mmd.3859
    @mmd.3859 3 роки тому +1

    Please you build on video about how to using the wireshark in windows 10

  • @dicao6526
    @dicao6526 3 роки тому +1

    Thanks Chris. I like your passion when explan all of this. 🤗

    • @ChrisGreer
      @ChrisGreer  3 роки тому

      Thanks again Di. I appreciate the feedback.

  • @RamKumar-tj7ln
    @RamKumar-tj7ln 3 роки тому +1

    Learn it by heart -- By order of the peaky blinders

  • @nicoladellino8124
    @nicoladellino8124 2 роки тому

    Very nice video, TNX.

  • @MoonIsCheese
    @MoonIsCheese 2 роки тому +3

    Why did you not select the log file from the path you created in the system variable?

  • @CDizzzle4Rizzle
    @CDizzzle4Rizzle 2 роки тому +2

    You have some really great content on your Channel. You should start accepting BAT's so we can tip you!

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      Hi Chris D - Thanks for the comment. Actually I had considered setting something like that up but wasn't sure if anyone would actually do it! I appreciate the suggestion and will definitely look into it.

  • @alexborodin845
    @alexborodin845 2 роки тому +1

    Cool, thank you!

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      thanks for the comment Alex!

  • @grendal1974
    @grendal1974 3 роки тому +2

    Chris, as always you are the man.

    • @ChrisGreer
      @ChrisGreer  3 роки тому +1

      @Bill Proctor - Great to see you here Bill! Hope all is well on your end.

    • @grendal1974
      @grendal1974 3 роки тому

      @@ChrisGreer absolutely. Just looking forward to being able to travel again for work. Hope to hang out with you sometime soon!

    • @ChrisGreer
      @ChrisGreer  3 роки тому

      @@grendal1974 That would be awesome Bill! Let's chat sometime here soon.

  • @TheAychi
    @TheAychi 2 роки тому +1

    Thank you Sir :)

  • @ryankan1229
    @ryankan1229 Рік тому +1

    Hi Chris, so sorry, after I tried to save the SSL Key log file, I cannot find the file at all, for some reason. I am the administrator but I just cannot find it. Is there anything I must do? Thanks!

  • @johnvardy9559
    @johnvardy9559 2 роки тому +1

    about session keys how i could fix that on mac os?

  • @jamesa4958
    @jamesa4958 2 роки тому +1

    Awesome videos. Thank you

  • @ethancai681
    @ethancai681 2 роки тому +1

    Thanks, Chris. This video helps me a lot.

  • @techproductowner
    @techproductowner 2 роки тому +1

    Dear Sir wonderful , How do I decrypt Windows desktop application traffic using wireshark , the desktop app use TLS1.2 and Websocket for communication

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      Hello DataSkull - we would need to see if the app will locally store the TLS keys. As you saw in the video, chrome will do it in an environment variable, but that may not be the case for the application you are trying to decrypt. You have to dig into it and see if the app will store them.

    • @JackSparrow-xm3im
      @JackSparrow-xm3im 2 роки тому

      Same issue here looks like better to go with a proxy server

  • @gavenchan
    @gavenchan Рік тому +9

    Interesting. Great video. I am puzzled by 2 files in this video. Are the "sslkeylog.log" and "DecryptTraffic_Wireshark.log" the same file?

    • @vladislavvasilev3441
      @vladislavvasilev3441 7 місяців тому +1

      I'm also wondering this - did you find this out?

    • @intnsity
      @intnsity 6 місяців тому

      Yes anyone?

    • @biggspoon68
      @biggspoon68 5 днів тому

      i noticed that too, and now i am confused

  • @Letraveler_rd
    @Letraveler_rd 2 роки тому +1

    I'm loading the file to Wireshark, but some reason the decryption is not working. I'm using a windows machine.

  • @dougspindler4947
    @dougspindler4947 2 роки тому

    Excellent

  • @HuzaifaGujjar
    @HuzaifaGujjar 2 роки тому +1

    Best as always.

  • @ko-Daegu
    @ko-Daegu 2 роки тому +2

    I would love a video on how to read important info of encrypted data without decrypting it

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      That is a great skill - because in the real world, most of the troubleshooting I do is without the decryption keys.

    • @thomasedison4937
      @thomasedison4937 Рік тому

      @@ChrisGreer I'd love to learn that skill....
      Really wish you could make a video on that...
      I'll truly appreciate 💜

  • @yosuasitorus3478
    @yosuasitorus3478 2 роки тому +2

    Hai Chris, how about desktop App not browser, how do we generate that log file?

  • @m.adnankhan8245
    @m.adnankhan8245 2 роки тому +1

    Amazing Chris :)
    Thanks!

  • @JackSparrow-xm3im
    @JackSparrow-xm3im 2 роки тому +2

    Hey Chris really great video it helped me a lot but I just wanna mention that, I don't know for some reason but sslkeylog doesn't store every ssl log, it does stores majority of them but not every, soo I came across some proxy servers like charles which stores every ssl but don't know how to set it up on windows to work perfectly. Please make a video about charles or any other proxy server you recommend to decrypt fully...... Thanks

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      Thanks for the feedback Jack - I would need to figure out how to reproduce that in order to tshoot on my end.

  • @garrettjones631
    @garrettjones631 2 місяці тому

    Great video! I have a few questions.
    1. How are attackers able to decrypt https? Are they able to get this log file somehow?
    2. Where are the session keys stored before you set this environment variable, just in memory?
    3. If you had a computer disk image and a pcap of that computers traffic could you extract session keys from the image to decrypt the https traffic?

  • @iterminator987
    @iterminator987 2 роки тому +2

    Hello, was wondering if the decryption could be done using a MITM, for instance the MITM proxy...Would be great to see that happen!!! Ty

    • @ChrisGreer
      @ChrisGreer  2 роки тому +1

      Hey, thanks for the comment. I'll see if I can get it working... (or breaking, depending on how you look at it!)

  • @shumpakshu
    @shumpakshu 2 роки тому +1

    This is some great stuff, keep going.

  • @StankBrewing
    @StankBrewing 6 місяців тому

    Thank you, Chris, for such a great educational video)

  • @simmi352
    @simmi352 11 місяців тому +1

    Hi Chris, thanks for this one really learnt a lot here. In saying that I've been seeing more of Application Layer Encryption lately, so in theory if you encrypt at the application level before hitting the pipe and encrypt using TLS, would you be able to get to the cleartext?

  • @alexmannrocks
    @alexmannrocks 2 роки тому +2

    Great video and example, thanks for what you do

  • @aadityadeshpande9080
    @aadityadeshpande9080 2 роки тому +1

    Great information 🙂
    Please do some video on HTTP3 and its benifits...
    Found this channel after watching your colab on David's channel...
    Thank you 😊

    • @ChrisGreer
      @ChrisGreer  2 роки тому +1

      For sure! I will be doing more content around QUIC and H3 as things continue to develop. Thank you for the comment. I the meantime check out my QUIC decryption video here - ua-cam.com/video/QRRHA_5hS2c/v-deo.html

  • @jagzam
    @jagzam 2 роки тому +1

    Gracias por compartir toda esta información.!!

  • @tinmaung5828
    @tinmaung5828 3 роки тому +1

    Thank you so much sir for this wonderful video and it is helpful for us.

    • @ChrisGreer
      @ChrisGreer  3 роки тому

      Thanks for the comment Tin!

  • @flinfaraday1821
    @flinfaraday1821 2 роки тому +1

    Is the SSLKEYLOGFILE env variable only used by chrome? Or system wide for anything using SSL?

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      I have gotten it to work with Firefox and chrome. I have heard it works with edge but have not tried it for myself. All others, a ton to try… I guess it just depends on the api

  • @Majidiof
    @Majidiof 2 роки тому +1

    Thank you very much Chris 🙏🏻

  • @v.harinath5971
    @v.harinath5971 2 роки тому +1

    Unable to see the keylog file generated in windows. Any additional steps to be followed

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      Make sure that you restart chrome completely after setting up the environment variable. Also - if that doesn't work, give it a shot with Firefox.

  • @maxfightz4623
    @maxfightz4623 Рік тому +2

    how would i apply this to a app

  • @albaniaiptv8335
    @albaniaiptv8335 2 роки тому +1

    great video. can we decrypt request manually by extracting public certificate of website ?

  • @ImranKhan-tc8jz
    @ImranKhan-tc8jz 3 роки тому +1

    Thank you so much man. Excellent explanation.

  • @gregwallace9481
    @gregwallace9481 2 роки тому +1

    Is there a way to do this for non-web browser traffic? For example, I am trying to decrypt commands and responses with racadm in powershell but the keys don't appear in the log.

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      Hey Greg - I have only tried this with Chrome and Firefox. It would def take some more digging to learn where/how/if other API's store the keys.

  • @AbrahamBilly
    @AbrahamBilly 3 роки тому

    thankyou for sharing, but how we can get the tls key without touching the victim pc / laptop?

    • @ChrisGreer
      @ChrisGreer  3 роки тому

      You would need send all traffic through a man-in-the-middle device on the network, or you could install an agent on the server that will capture them. Either way, it's designed to be hard to get the keys...

    • @AbrahamBilly
      @AbrahamBilly 3 роки тому +1

      @@ChrisGreer isn’t that man in the middle attack / ARP Poisoning doens’t catch the key? please make a video how to get the keys via man in the middle attack sir.

  • @collectionsforyou3209
    @collectionsforyou3209 4 місяці тому

    Thanks grish its really nice and helpful

  • @ginadi9733
    @ginadi9733 3 роки тому +1

    Great tutorial

    • @ChrisGreer
      @ChrisGreer  3 роки тому +1

      Thanks Ginadi. Stick around for more around TLS.

  • @bravebacon4175
    @bravebacon4175 2 роки тому +1

    Wait so can I store the keys wherever or does it need to be that specific user address?

  • @sureshhkumar955
    @sureshhkumar955 2 роки тому +1

    How to get the bottom filters?

  • @NathayT-vr8hm
    @NathayT-vr8hm Рік тому

    ❤❤It works 💯% dude I don't have a words u are really great!

  • @dronomads
    @dronomads 3 роки тому +4

    Thanks, Chris I really appreciate you making videos. Taking the help of your videos I was able to help my colleagues and solve infrastructure problems. Keep making the good stuff as you explain the stuff in quite simple terms.

    • @ChrisGreer
      @ChrisGreer  3 роки тому +2

      Nice! That is great Prateek - glad to hear that the videos helped you. More to come!

  • @tjeaton2405
    @tjeaton2405 2 роки тому +1

    Hey love the video, how can this be done if I'm not using either chrome or firefox?

  • @Animeatlas351466518427er
    @Animeatlas351466518427er Місяць тому

    Hey thanks for sharing this cool looking video curiosity question after you decrypt the traffic files and you go to open it in a browser and it says that the content isn't available or if the site was taken down or can the content still be viewed?

  • @pystykorva7114
    @pystykorva7114 3 роки тому +1

    Brilliant!

  • @derrickgyamfi4823
    @derrickgyamfi4823 Рік тому

    Thanks Greer, very useful

  • @putrafams8944
    @putrafams8944 2 роки тому

    hi I'm from Indonesia ❤️

  • @alimohammed817
    @alimohammed817 3 роки тому +1

    sir, I have tls.pcap packet , how can i decrypt SIP/TLS v1.2 to see RTP ??
    Note that
    TLS encrypt by CA ?

  • @christiangrenier9434
    @christiangrenier9434 2 роки тому +1

    Hi Chris, I have a IOT device connected to AWS. I have all certicates... is it possible to decrypt the communication using wireshark? My IOT device is connected to an access point. Actually, I have a switch that I can route all the traffic to the PC but all packets are encrypted. So, I'd like to see the packet contents. Thanks a lot!

  • @ldavader2704
    @ldavader2704 2 роки тому +1

    Hey Chris, what about other TLS traffic which is not made from any browser? Thanks

    • @ChrisGreer
      @ChrisGreer  2 роки тому +1

      I've only been able to get it to work with Chrome and Firefox, I haven't tried to store them from any one app.

  • @RdozeTV
    @RdozeTV 3 роки тому +1

    Where the f is the pre master secret log filename came from? that's not in the environmental variables you made right?

  • @OmegaBlogss
    @OmegaBlogss 3 роки тому

    Hola, saludos desde Argentina 😃

  • @abhayn3923
    @abhayn3923 2 роки тому +1

    I followed all the steps as explained by you, but I'm still unable to log the ssl keys into my local directory. May I know why that maybe happening? The file is empty , that is, no keys are logged into it.

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      Hmm... weird. That is frustrating. Ok maybe something changed with an update. I'd suggest trying Firefox. If that doesn't work - I've been able to get it working pretty reliably with Kali Linux and Chrome. I demonstrate that here -ua-cam.com/video/QRRHA_5hS2c/v-deo.html

  • @ashutoshpadha8813
    @ashutoshpadha8813 2 роки тому +1

    sir can it also decrypt the traffic of insta ,tele, twitter like websites ?

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      I haven't tried it with mobile apps yet. But if they store the keys to the keylog, then in theory... yes!

  • @brentonm.newbon6026
    @brentonm.newbon6026 3 роки тому +1

    Great video!

    • @ChrisGreer
      @ChrisGreer  3 роки тому

      Thanks! Appreciate the comment.

  • @w451-qx3kx
    @w451-qx3kx 3 роки тому +3

    hi, do you know if there is a way to decrypt https when it isn't from the browser, meaning it doesn't get logged to a key file?

    • @ChrisGreer
      @ChrisGreer  3 роки тому

      Probably - I'd have to tinker with a specific app or implementation, but I imagine if you dig deep enough in the code there is a way to do it.

    • @adammason1587
      @adammason1587 2 роки тому

      @@ChrisGreer So from a hackers perspective in todays day and age, I imagine the flow is something like this:
      1. compromise endhost through zero day or unpatched vulnerability
      2.create a reverse tcp shell via proxy chaining on proxy's that dont log user data (or TOR)
      3.setup the log environmental variable in OS (congrats you have modified a system that's not yours and have now officially committed a crime, though I guess the reverse tcp shell could be argue as the stage when that happens)
      4. discretely capture network traffic, and discretely transfer data back (no idea how that's done)
      5. look for PII/PCI decrypted data
      6. Clear traces of you being there... also not really sure how they would do that. Probably clear a bunch of internal log files.
      I know this comment puts you in a precarious situation, because how do you teach content and answer questions without indirectly possibly helping a hacker, but as a company network engineer I still dont understand how hackers pull of what they do. Is it just a matter of hiding in plane sight and due to the sheer amount of data that goes across the wire, you are hoping nobody notices?

    • @chelvis1569
      @chelvis1569 2 роки тому

      @@adammason1587 Very interesting, to transfer the data back in thinking you could do a loopback but that could be traced.

  • @_Omni
    @_Omni 3 роки тому +1

    Fiddler is good for this 😁

    • @myyt905
      @myyt905 3 роки тому

      How! Explain please

  • @odogg6899
    @odogg6899 2 роки тому +1

    Am i supposed to take that log file i d/l and drop it in SSL Keys folder or will system automatically create one for me?

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      You should have to create that folder but the system will create the log.

  • @0x80O0oOverfl0w
    @0x80O0oOverfl0w 3 роки тому +1

    Does this only work with Chrome? Or will it log keys from windows update and other OS calls?

  • @lofman
    @lofman 3 роки тому +1

    Great vid, thanks!

    • @ChrisGreer
      @ChrisGreer  3 роки тому +1

      Thanks for the comment! I really appreciate the feedback.

    • @lofman
      @lofman 3 роки тому

      @@ChrisGreer didn't know it was that easy. I guess the environment variable you added in the beginning is Chrome specific?

    • @ChrisGreer
      @ChrisGreer  3 роки тому

      It works with Chrome, Firefox, and some chromium based browsers. I am not much of an Edge user so I haven't tried it myself, and I understand Safari in the Mac environment isn't too happy with this variable either.

  • @ivena
    @ivena 3 роки тому +2

    Very useful, how we can do it on linux with mitm? Hope to see this in the next video

  • @KaySwiss21
    @KaySwiss21 2 роки тому +1

    I have a question... If I'm using a wifi adapter that's in monitor mode, and passively sniffing the other devices on my home network... Is there any methods for decrypting other clients on the same network? Other clients meaning , if I'm on my laptop and I want to see what's going on with my Android on the same network, what methods (if any) are there to decrypt the androids traffic?

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      That is a great question. In theory, you could do a man in the middle attack and intercept their traffic. You can capture it is a passive listener on WiFi, but with the additional layer 1/2 encryption for WiFi (WPA2 for example) it adds another level of complexity. I have never done it.

    • @KaySwiss21
      @KaySwiss21 2 роки тому

      @@ChrisGreer Thanks for the reply! My mind was going into that direction but wasn't sure if there were other ways/methods. Looking forward to more content as well. Since I'm a newer viewer, I dont know the extent of your expertise. But would love to see some cyber security / forensic stuff as that's what I'm currently studying for an associates degree. I see alot of the attacking and vulnerability side, but would like to see more content on defensive and forensic analysis.