Packet Tuesday - TLS Client Hello

Поділитися
Вставка
  • Опубліковано 8 лис 2024

КОМЕНТАРІ • 8

  • @davesabra4320
    @davesabra4320 Рік тому +4

    Thanks ! High density of information about the TLS client hello packet packed into this video.

  • @renatosilvamartins
    @renatosilvamartins Рік тому +3

    Great content! Thank you for sharing these videos with us.

  • @Khadgin
    @Khadgin Рік тому +2

    Another great episode, I really appreciate the history-tidbits about implementations :) Maybe a bit too laborious, but I'd love to see an episode about BGP, possibly including some explanation of BGP-highjacking which was very "popular" a few years ago.

  • @eduardoreta6893
    @eduardoreta6893 Рік тому

    Loved the video, keep them coming!!!

  • @rajkaransinghgill2082
    @rajkaransinghgill2082 Рік тому +1

    At 8:49, wireshark shows us value of hex 2 for do not fragment flag while the true value is 4. I think it does because of only 3 bits available for flags and it assumes DF bit is second and gives it value 2 even though it is the 3rd bit in high order nibble.

    • @johannesullrich3297
      @johannesullrich3297 Рік тому

      Correct. the fragment flags (Evil Bit, Do Not Fragment, and More Fragment) are interpreted separately by Wireshark. so MF=1, DF=2, and Evil=4. While the bit values at ip[6] are one-off. (Evil=8, DF=4, MF=2 and the highest offest bit =1)