Big thank you to Proton for sponsoring this video. Get Proton VPN using my link: davidbombal.wiki/protonvpn2 // Chris’ SOCIAL // LinkedIn: www.linkedin.com/in/cgreer/ UA-cam: ua-cam.com/users/ChrisGreer X/Twitter: twitter.com/packetpioneer // GitHub Link to lab file // Packet Pioneer GitHub: github.com/packetpioneer/youtube/blob/main/Lab1-GreerBombal_ItsNotTheNetwork.pcapng // UA-cam videos REFERENCE // Wireshark Tutorial for beginners. Where to start with Wireshark: ua-cam.com/video/OU-A2EmVrKQ/v-deo.html // UA-cam PLAYLIST // Wireshark with Chris Greer: ua-cam.com/video/rmFX1V49K8U/v-deo.html&pp=iAQB // David SOCIAL // Discord: discord.com/invite/usKSyzb X: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal UA-cam: www.youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
29:10 I spent a lot of time earlier to understand that why I am getting huge value in segment length column although MTU is set 1500. Thank you Chris for going to different tangents; it helps a lot! Thank you David for bringing such valueable persons on your channel!
Ironically talking about the slow passage of time between packets, but at the same time this video was over before I knew it! Fantastic explanation as always, and lovely to see you again as a guest, Chris.
When you think about it, there is great significance to the passage of time. And there is such great significance to the passage of time when we think about a day in the life of our packets.
I ❤ the videos you do with Chris Greer. The info he provides about Wireshark & what you're looking at + for within pcap's is something, I feel, today every network'er should know how to do & what to look for. 👍👍👌
A very big thank you to both of you. You guys are literally changing the way I look into network issues and I am becoming better and better each day. Keep up the beyond-excellent work.
Hey Chris don't listen anybody and give us that details please. Those kind of knowledges are necessary when you try to give a logic to processes. Thank you David, awesome again. Appreciate it.
These are always fascinating and as for the digressions, I'm OK with them because you always come back to the point you digressed from but have also imparted some breadth to the discussion. I could always jump ahead in any case if I found them unhelpful.
I ❤ the detailed tangents. In this case (29 min mark), it helped me understand where in the process the capture actually happens and why they show larger than 1500. Keep the details coming.
@@ChrisGreer Absolutely! I’ve just started transitioning to an IT based career and earned the A+ certification and working on security+. Every time you expanded upon the point you were making it definitely helped me understand things better. Thanks for your content, and I absolutely subscribed to your channel!
great work David and Chris. I love your contents. I'm someone looking for breakthrough in Wireshark packet analysis. I feel Chris' channel is just the right place for me. Love from Nigeria. Keep up the good work. Thank you so much David. Looking forward to more sessions like this with you and chris
Love the details and tangents because it helps me understand more of the big picture. Awesome content and I'm going to get lost in your channel, Chris. Thanks both!
This is brilliant, I have another bookmarked video! Digressing is fine and works for me, Chris adds value to the subject when he does this. Even in 2024 the basic fundamentals of TCP are essential, just wish I had more time to spend in this area.
Great video! If you 're TSing issues regarding Window Size and Packet Loss (to double-check if the TCP window size is not getting slammed on the receiver, and on the very rare occasion vice versa). select under 'Statistics - TCP Stream Graphs - Window Scaling', this a good tool to measure and view the respective Window scaling between C/S and S/C. I think Chris made a video of it years ago! I hope this helps :)
I love when you have chris on. I bought tye course he did with wireshark and nmap, just havent had time to start it, yet. Busy with ccna study and tls study with Ed Harmoush. When chris goes 'on tangents' it's an excellent learning opportunity. Would gave liked a bit more on the relationship between segment size and window size in tcp. Would also like to see more about QUIC. Thanks.
Good to hear an ad for a VPN that's really just about what it's main function is, which is encrypting traffic. You can build one at home with a raspberry pi if you can find one, you just wont have the geolocation hopping. It is just a good first line of defense against attacks, as letting people know your IP can let them possibly wreak havoc on your device.
Great video!! I do like when he gets straight to the point though. The tangents throw me off cause I lose focus. When he gets straight to the point I feel like gain so much knowledge and light bulbs start going off. Thanks again for this amazing content!!
Thanks to you both for this video!!! Had a problem, which seems to be a very similiar to this and I used your technique to troubleshoot! Thank you very much!! :)
Brilliant video as usual. David and Chris are so sweet persons and have the ability to pass their knowledge. and that's make the difference!! You can be a great scientist, but if you dont have the ability to spread your knowledge, you cant be a good teacher.
Really fantastic video and good to see Chris x David again. David please invite Neal Bridges again and talk about Cybersecurity and how AI is shifting the paradigms of the Cybersecurity Thanks and Love from Pakistan ❤
Like always this content with chris is spot on and awesome. BTW tangents are awesome, they help out a bunch.👍, I wish I could give these videos more than 1 thumbs up LOL
Hands on is the Best way to learn, build home labs small or large testing stuff on that and watching what it does is when you can really grasp this stuff.
I really like it, a lot! You know, those detailed tangents. An explanation of how an application works and what you can use it for is nice, but if you skip those tangents, I will not know why everything I see is or behaves just slightly different from what you're explaining. I'd have to look up every single detail that you explain in those tangents. But if you have physical access to the network, can't you then just hook up to the wire that is going into your modem or coming out of your modem to see what packages are sent from the server?
Best Wireshark Howto EVER. +bonus TCP SYN ACK analysis, hit _that_ spot by bringing out an RFC reference. So dope good content man tangent detail Approved [ACK]. =:r[]
"Ya I had 'er, and all I got was.. EVERYTHING!" Low level? Well I did turn on my physical connector's Promiscuous mode! Rocked that Packet Capture all night! After all; "PCAPs or it's fake!".
It's a good question. Over the web, many services are switching to QUIC under our noses. If it is an internal enterprise application, it may not be worth the switch unless users are widely distributed over unreliable networks. That is where QUIC can outshine TCP. For for general use, TCP is just fine. Most of TCP lives on within QUIC anyway. Thanks for asking!
I am a windows user and using wireshark version 4.0.0 . when I jumped to check tcp option from the server side. I could find the field that showed me the SACK is not supported and also the window size. Do I need to update my wireshark ??
I have a question, my internet connection is 100 megabytes , speedtest shows it but my downloading speed is 2.5 MegaBits (tested on test files) . Whats the problem?
Can you please give me a quick synopsis of why Proton VPN compared to someone like Nord VPN? I know proton is a sponsor, but I believe you can provide some of what I’m asking about. Am I able to get more granular with proton as compared to Nord?
Big thank you to Proton for sponsoring this video. Get Proton VPN using my link: davidbombal.wiki/protonvpn2
// Chris’ SOCIAL //
LinkedIn: www.linkedin.com/in/cgreer/
UA-cam: ua-cam.com/users/ChrisGreer
X/Twitter: twitter.com/packetpioneer
// GitHub Link to lab file //
Packet Pioneer GitHub: github.com/packetpioneer/youtube/blob/main/Lab1-GreerBombal_ItsNotTheNetwork.pcapng
// UA-cam videos REFERENCE //
Wireshark Tutorial for beginners. Where to start with Wireshark: ua-cam.com/video/OU-A2EmVrKQ/v-deo.html
// UA-cam PLAYLIST //
Wireshark with Chris Greer: ua-cam.com/video/rmFX1V49K8U/v-deo.html&pp=iAQB
// David SOCIAL //
Discord: discord.com/invite/usKSyzb
X: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
UA-cam: www.youtube.com/@davidbombal
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended.
Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Old days. Fluke optiview, and iperf.
29:10 I spent a lot of time earlier to understand that why I am getting huge value in segment length column although MTU is set 1500. Thank you Chris for going to different tangents; it helps a lot! Thank you David for bringing such valueable persons on your channel!
Yeah that is a tricky one!
Wasn't expecting to watch this end to end, - but damn, enthralled. Love this stuff!
Ironically talking about the slow passage of time between packets, but at the same time this video was over before I knew it! Fantastic explanation as always, and lovely to see you again as a guest, Chris.
When you think about it, there is great significance to the passage of time. And there is such great significance to the passage of time when we think about a day in the life of our packets.
I ❤ the videos you do with Chris Greer.
The info he provides about Wireshark & what you're looking at + for within pcap's is something, I feel, today every network'er should know how to do & what to look for.
👍👍👌
A very big thank you to both of you. You guys are literally changing the way I look into network issues and I am becoming better and better each day. Keep up the beyond-excellent work.
Hey Chris don't listen anybody and give us that details please. Those kind of knowledges are necessary when you try to give a logic to processes. Thank you David, awesome again. Appreciate it.
Chris is a great mentor. His knowledge, personality and demeanor lend himself to being great. Always enjoy his content, thanks for hosting him.
Thanks for the comment! I really enjoy coming on and chatting with david.
Couldn’t have said it better
These are always fascinating and as for the digressions, I'm OK with them because you always come back to the point you digressed from but have also imparted some breadth to the discussion. I could always jump ahead in any case if I found them unhelpful.
David & Chris you are opening our eyes 👀. Thank you 🙏
Happy to hear that! You're welcome!
I ❤ the detailed tangents. In this case (29 min mark), it helped me understand where in the process the capture actually happens and why they show larger than 1500. Keep the details coming.
No lies, the detailed tangents really help expand on the why of it for me. Great video guys!
Thanks for the feedback. I love getting to the point, but so much is lost when you do that.
@@ChrisGreer Absolutely! I’ve just started transitioning to an IT based career and earned the A+ certification and working on security+. Every time you expanded upon the point you were making it definitely helped me understand things better. Thanks for your content, and I absolutely subscribed to your channel!
Thanks Chris/David. Chris I love more detail than less detail when explaining different things.
I once used the skills Chris taught to analyze an LNK file attack, showed me how beautiful that attack was...
Thanks Chris Greer and David Bombal.
Getting in detail is actually good as it further clears the concept of what is behind the stuff you're imparting.
great work David and Chris. I love your contents. I'm someone looking for breakthrough in Wireshark packet analysis. I feel Chris' channel is just the right place for me. Love from Nigeria. Keep up the good work. Thank you so much David. Looking forward to more sessions like this with you and chris
I watch lots of your videos David but damn!!... this has been one of my favorites by far.
Please we need more content like this 🙏🏼🙏🏼🙏🏼
Love the details and tangents because it helps me understand more of the big picture. Awesome content and I'm going to get lost in your channel, Chris. Thanks both!
I bought this dudes Wireshark course on Udemy; very solid. Would recommend for anyone in IT to take it. Thank you David for having this dude on.
This is brilliant, I have another bookmarked video! Digressing is fine and works for me, Chris adds value to the subject when he does this. Even in 2024 the basic fundamentals of TCP are essential, just wish I had more time to spend in this area.
This channel is a goldmine for aspiring networking/cyber security professionals
Chris I love your side bars and detailed tangents little buddy absolute gold!
This is very timely, I'm dealing with network issues right now!
Great video! If you 're TSing issues regarding Window Size and Packet Loss (to double-check if the TCP window size is not getting slammed on the receiver, and on the very rare occasion vice versa). select under 'Statistics - TCP Stream Graphs - Window Scaling', this a good tool to measure and view the respective Window scaling between C/S and S/C. I think Chris made a video of it years ago! I hope this helps :)
I love when you have chris on. I bought tye course he did with wireshark and nmap, just havent had time to start it, yet. Busy with ccna study and tls study with Ed Harmoush. When chris goes 'on tangents' it's an excellent learning opportunity. Would gave liked a bit more on the relationship between segment size and window size in tcp. Would also like to see more about QUIC. Thanks.
Much appreciations guys! Patiently waiting for that SACK video
This is a great idea.
Good to hear an ad for a VPN that's really just about what it's main function is, which is
encrypting traffic. You can build one at home with a raspberry pi if you can find one, you just wont have the geolocation hopping. It is just a good first line of defense against attacks, as letting people know your IP can let them possibly wreak havoc on your device.
I love chris, hes always trying to just teach us stuff but like actually without peddling shitloads of courses and shit
Love the detailed tangents. Would like to know what the window size is.
What a G! Thanks for introducing me to this guy. I've been using WS for years and it's nice to pick up some new tricks.
You're welcome! Chris is the person to follow if you want to learn about Wireshark.
Great video!! I do like when he gets straight to the point though. The tangents throw me off cause I lose focus. When he gets straight to the point I feel like gain so much knowledge and light bulbs start going off. Thanks again for this amazing content!!
That is great feedback, thank you!
Great content, as always David and Chris! I will stay on one point: "...let's buy training instead of a lot of equipment!"
Always enjoy a good detailed tangent.
More Chris Greer videos! His content is awesome. Post more on your own channel Chris!
I know… 😆 thanks for calling me out!
I love the real world tangents, especially if they are heavily technically based. Much love, and thank you for the wealth of information.
Fantastic Chris for the wonderful troubleshooting session.
This is so awesome!
@Chris, I support the detailed tangents!
Glad you enjoyed the video!
For me the way Chris explain it is so excellent and informative.
Hey David and Chris,
You both are awesome. Thanks for all these videos.
Chris, you are looking cool with your new beard style 😊..
Great work. Your videos keep me entertained and interested. Thank you again.
Glad to hear it!
If you had mention VirtualBox at the beginning, I wouldn't even need to check the pcap lol
Great video guys thx!
Great stuff! Really enjoyed Chris' analysis! Keep 'em coming!
Thanks to you both for this video!!! Had a problem, which seems to be a very similiar to this and I used your technique to troubleshoot! Thank you very much!! :)
Brilliant video as usual. David and Chris are so sweet persons and have the ability to pass their knowledge. and that's make the difference!! You can be a great scientist, but if you dont have the ability to spread your knowledge, you cant be a good teacher.
Brilliant.
And Chris, you got yourself a new subscriber.
Thx for sharing both.
That's cool! Thank you for the tricks!! I will use wireshark to understand in depth of packets!
Really fantastic video and good to see Chris x David again. David please invite Neal Bridges again and talk about Cybersecurity and how AI is shifting the paradigms of the Cybersecurity
Thanks and Love from Pakistan ❤
Thank you guys. you made packet analysis interesting. Definitely checking on Chris's channel and learn more about Wireshark.
Really enjoyed video! Thanks for both of you guys for these informative content.
Like always this content with chris is spot on and awesome. BTW tangents are awesome, they help out a bunch.👍, I wish I could give these videos more than 1 thumbs up LOL
Hands on is the Best way to learn, build home labs small or large testing stuff on that and watching what it does is when you can really grasp this stuff.
28:50 what usually causes the segmentation or reassembly issues?
I really like it, a lot! You know, those detailed tangents.
An explanation of how an application works and what you can use it for is nice, but if you skip those tangents, I will not know why everything I see is or behaves just slightly different from what you're explaining. I'd have to look up every single detail that you explain in those tangents.
But if you have physical access to the network, can't you then just hook up to the wire that is going into your modem or coming out of your modem to see what packages are sent from the server?
Thanks for sharing. It is very informative and well presented. Keep it up
Great interview and tutorial! Many helpful insights 💎
Glad you enjoyed it!
On all of the web, you guys are the best!
Great content and bravo! And oh your video editing is top top 🔥
Glad you liked it!!
Keep on tangenting. Thats what they made 1.5x speed for
Love youre content David, ure my example of a hero!
Best Wireshark Howto EVER. +bonus TCP SYN ACK analysis, hit _that_ spot by bringing out an RFC reference. So dope good content man tangent detail Approved [ACK]. =:r[]
Hi Chris or Dave: At 32:39 you say we are dealing with two 1460s but I see 14060. Can you clarify this for me? How is 14060 adding up to 2920? Thanks
I really enjoy this. Wireshark is such an important tool.
Thank you for sharing your knowledge and experience.
I enjoy listening to both you guys
"Ya I had 'er, and all I got was.. EVERYTHING!" Low level? Well I did turn on my physical connector's Promiscuous mode! Rocked that Packet Capture all night! After all; "PCAPs or it's fake!".
Thank you very much for the video you made; I learn a lot!
This person did not invest money on Wireshark, but he owns it.
Hello David, greetings from Chile, a query do you know of any book that you recommend that talks about the study of packages?
Great video guys, much appreciated
Thank you David and Chris. What about the QUIC protocol, what is your opinion? Should we use it instead of the good old TCP?
It's a good question. Over the web, many services are switching to QUIC under our noses. If it is an internal enterprise application, it may not be worth the switch unless users are widely distributed over unreliable networks. That is where QUIC can outshine TCP. For for general use, TCP is just fine. Most of TCP lives on within QUIC anyway. Thanks for asking!
Thank you Chris, but isn't the QUIC build on top of the UDP? @@ChrisGreer
Great learning this morning weekend thank you sir for sharing this tutorial video it’s makes me inspired by this video sir 32:41
Thanks Chris and David!!!
This seems like a murder mystery thriller movie to me. lol. 🤣🤣🤣
David thanks you can improve my education
Great to see u guys again
my fav. thanks, david, & chris.
How do you add that TCP segment length column? I've looked and can't find anything?
Super valuable video! Thanks!
Good work out of you both 👍👍👍
Thank you!
so what was shaping the packet? which virtual setting on the host was responsible for this?
Can you do one on BGP and Slow Peer for troubleshooting slow networks?
eagerly waiting for stuff like that from you
I am a windows user and using wireshark version 4.0.0 . when I jumped to check tcp option from the server side. I could find the field that showed me the SACK is not supported and also the window size. Do I need to update my wireshark ??
Hi,
Does these same techniques apply to WAN networks?
why 7 multiply with 128 in window scale is a problem, can you explain please?
Chris you look better with the beard :) - thank you David and Chris for this ...
I would love to see how to troubleshoot asymmetric routing that is messing up TCP handshakes, using Wireshark
I have a question, my internet connection is 100 megabytes , speedtest shows it but my downloading speed is 2.5 MegaBits (tested on test files) . Whats the problem?
how did you get the TCP Segment Length column?
Enjoyed the content! 😎👊 “it’s always DNS”
keep it up with the details in wireshark. I need to lean nore :)
Can you please give me a quick synopsis of why Proton VPN compared to someone like Nord VPN?
I know proton is a sponsor, but I believe you can provide some of what I’m asking about.
Am I able to get more granular with proton as compared to Nord?
Idea for another video : covering active directory authorizations or AD attacks
yes please share details and rabbit trails !
Chris is Awesome
Agreed!
Great video. Thank you.
Glad you liked it!
It was over 5 minutes and we weren't in a pcap file... 😮😅
Do you have a video on tcpdump?
I want to start into cyber security, from where should i start
Thanks Chris
Watching now!