Plaintext Packets
Plaintext Packets
  • 39
  • 437 432
How Governments Watch the Web - Why Absolutely Privacy Online Doesn't Exist
In this second instalment of my privacy series, I cover how governments and big tech aggregate data to effectively monitor all users on the internet. We cover how data is captured using network taps, how popular websites provide data feeds, and the tools used to analyze it all.
Useful links:
Support the channel:
buymeacoffee.com/plaintextpm
Discord:
discord.gg/CV5DzzaYF5
zhlédnutí: 1 156

Video

What Can Your ISP See? - What Your ISP Knows About Your Internet Activities
zhlédnutí 2,4KPřed 2 hodinami
In this video I show you just what information your internet provider (ISP) can determine from analyzing your traffic. This includes what websites you visit, and in some cases just what you're doing on this websites. I also cover what benefits VPNs have to safeguard your traffic, while explaining that absolute privacy on the internet doesn't really exist. Useful links: Support the channel: buym...
Learn TCP with Shell Shockers and Wireshark!
zhlédnutí 656Před 12 hodinami
In this video I do a deep dive into the TCP protocol by analyzing traffic from the game Shell Shockers! I cover: - Finding the IP of a specific web connection using Developer tools and conversation views - TCP theory and comparisons to UDP - The three-way handshake in detail - IP vs TCP conversations - Sequence / acknowledgement analysis - Live Shell Shockers action! :) Useful links: Support th...
How NMAP Works and How to Detect Port Scans in Wireshark
zhlédnutí 2KPřed 21 hodinou
In this video I demonstrate how port scanning works using the popular tool NMAP. I dig into some theory on how NMAP can detect a port is open, show you how to detect a port scan in a Wireshark capture, then cover some ways to deter and obfuscate your services from scanning. Useful links: Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
Hacking WiFi: Sniffing Traffic from Open Networks
zhlédnutí 1,7KPřed 14 dny
In this highly requested video I will be showing you how to sniff traffic from open wifi networks and analyze in Wireshark. I also cover why open wifi is so dangerous and why VPNs can protect you when you have no choice but to connect. Useful links: How to Make a Bootable Kali Linux USB: www.kali.org/docs/usb/live-usb-install-with-windows/ For wifi adapters that support monitor mode, Google 'wi...
Troubleshoot Docker Network Issues Using Wireshark
zhlédnutí 529Před 14 dny
In this video I troubleshoot some network performance issues in Docker using tcpdump and Wireshark. I show you how to build a custom image containing tcpdump, how to capture the data, and dive into some advanced Wireshark analysis to figure out the network issue. Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
Learn How the Address Resolution Protocol (ARP) Works in 10 Minutes
zhlédnutí 1,2KPřed měsícem
In this video I do a quick overview of the address resolution protocol, commonly known as ARP. I explain why MAC addresses are needed when communicating on a local network and how ARP helps populate mac address tables on networked-devices. Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
Free ISP Tracking in 5 Minutes - Netprobe Quick Tutorial
zhlédnutí 2,1KPřed měsícem
In this quick tutorial, I show you how to install and use the free open-sourced tool Netprobe to monitor the quality of your ISP connection over time. Total install time is about 5 minutes. For a full tutorial see the link below. To get started with Netprobe: 1. Download the repo here: github.com/plaintextpackets/netprobe_lite 2. Install docker: docs.docker.com/engine/install/ 3. From the comma...
Track Your Internet Quality for Free - Netprobe Full Tutorial
zhlédnutí 62KPřed měsícem
In this continuation video to 'Speed Overkill - How ISPs Sell You Bandwidth You Don't Need', I show you how to install and use the free open-sourced tool Netprobe to monitor the quality of your ISP connection over time. We cover a little theory on how Netprobe works, how to get the app launched in docker, and finally how to read the data from each metric. To get started with Netprobe: 1. Downlo...
How to Filter Conversations in Wireshark
zhlédnutí 991Před měsícem
In this video I will be showing you how to use Wireshark to drill down and filter the conversations you need to investigate. We cover some theory about IP vs TCP/UDP conversations, show you how to use the conversation view, and demonstrate two ways to build display filters. Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
Speed Overkill: How ISPs Sell You Bandwidth Instead of Performance (+ Bonus Free ISP Monitor Tool)
zhlédnutí 19KPřed měsícem
In this video I demonstrate how ISPs sell you more bandwidth than you actually need, when what you're really looking for is a reliable network which carries your traffic with minimal latency and loss. I dive into the three main factors which make up connection quality (bandwidth, latency and loss), explain why speedtests are almost useless, and show you how to estimate how much bandwidth you ac...
Wireshark Freestyle #2 - Finding Secrets in Open Wifi Networks
zhlédnutí 1,5KPřed měsícem
In this freestyle (full speed) video I show you all the information you can ascertain from users on an open WIFI network using Wireshark. I demonstrate why open WIFI networks are insecure, and explain how services like VPN can help protect your data from sniffers. Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
Learn How Speedtest.net Works Using Wireshark
zhlédnutí 3,1KPřed měsícem
In this video we use Wireshark to demonstrate how the popular website Speedtest.net measures your internet bandwidth. We talk about the theory of TCP and congestion control, and show you how to capture and analyze the Speedtest traffic in real time. Useful videos: How to Capture Traffic in Wireshark - czcams.com/video/wI2qfO61iFw/video.html Support the channel: buymeacoffee.com/plaintextpm Disc...
How to Measure YouTube Bandwidth Using Wireshark
zhlédnutí 1,4KPřed měsícem
In this video I demonstrate an easy way to chat how much bandwidth is being used in downloading a video from CZcams. I show you how to use the 'stats for geeks' function in CZcams, how to capture and filter out CZcams traffic in Wireshark, and how to graph the bandwidth utilization as the video is loaded. Useful videos: How to Capture Traffic in Wireshark - czcams.com/video/wI2qfO61iFw/video.ht...
How to Smuggle Data with Ping Part 2 - Windows Version
zhlédnutí 3,3KPřed 2 měsíci
How to Smuggle Data with Ping Part 2 - Windows Version
How to Smuggle Data out of the Network with Ping
zhlédnutí 116KPřed 2 měsíci
How to Smuggle Data out of the Network with Ping
Extract TLS Certificates using Wireshark
zhlédnutí 5KPřed 2 měsíci
Extract TLS Certificates using Wireshark
Wireshark for Cable Technicians - How to Prove that Internet Access is Healthy
zhlédnutí 2,6KPřed 2 měsíci
Wireshark for Cable Technicians - How to Prove that Internet Access is Healthy
Wireshark for Helpdesk Analysts - Troubleshooting a User's Website Issue
zhlédnutí 1,8KPřed 2 měsíci
Wireshark for Helpdesk Analysts - Troubleshooting a User's Website Issue
Why Should You Learn Wireshark?
zhlédnutí 2,2KPřed 3 měsíci
Why Should You Learn Wireshark?
How to Capture Traffic in Wireshark
zhlédnutí 2,2KPřed 3 měsíci
How to Capture Traffic in Wireshark
How to Take Down a Wifi Network from Within
zhlédnutí 2,3KPřed 3 měsíci
How to Take Down a Wifi Network from Within
How to DoS Your Network with this One Command
zhlédnutí 8KPřed 3 měsíci
How to DoS Your Network with this One Command
Extract Passwords from Telnet using Wireshark
zhlédnutí 1,8KPřed 3 měsíci
Extract Passwords from Telnet using Wireshark
Community Captures #1 Troubleshooting SMTP with Wireshark
zhlédnutí 600Před 3 měsíci
Community Captures #1 Troubleshooting SMTP with Wireshark
Prove that an API is Slow and the Network is Great!
zhlédnutí 978Před 4 měsíci
Prove that an API is Slow and the Network is Great!
How to Listen to Phone Calls in Wireshark
zhlédnutí 129KPřed 4 měsíci
How to Listen to Phone Calls in Wireshark
Wireshark Freestyle #1 - Small Network Problems
zhlédnutí 1,1KPřed 4 měsíci
Wireshark Freestyle #1 - Small Network Problems
Detecting Packet Loss in RTP Phone Calls Using Wireshark
zhlédnutí 1,2KPřed 4 měsíci
Detecting Packet Loss in RTP Phone Calls Using Wireshark
DNS Exfiltration with ChatGPT
zhlédnutí 3,6KPřed 11 měsíci
DNS Exfiltration with ChatGPT

Komentáře

  • @mikea785
    @mikea785 Před 14 hodinami

    Just awesome!!!

  • @razorr1920
    @razorr1920 Před 15 hodinami

    i just want to understand the implications of using a VPN + DNS OVER HTTPS

  • @mmaranta785
    @mmaranta785 Před 16 hodinami

    In the 90’s I worked for a defense contractor that was building a telephone and internet recorder to be installed at phone companies, so yeah they are spying, I mean duh.

  • @m4a1mag
    @m4a1mag Před 16 hodinami

    so basically the government could find out about anything?

  • @m4a1mag
    @m4a1mag Před 17 hodinami

    interesting

  • @shaunrowley7230
    @shaunrowley7230 Před 18 hodinami

    Another Excellent Video, I remember attending a Blackberry Conference in 2015 and the words on good deal of the slides were "Remember that every contact has a trace" that phrase has stuck with me ever since as it was true then and is today.

  • @UNcommonSenseAUS
    @UNcommonSenseAUS Před 23 hodinami

    How govts spy on every thIng : MONOPOLISED VIOLENCE

  • @xEndless11
    @xEndless11 Před dnem

    The data traffic can be read by the Device over which the traffic is routed, i.e. in this case the gateway. Even if you are using a secure HTTPS connection, the probability is very high that the Google inputs in the search as well as your access data to which pages can be seen as plain text in the recording.

    • @plaintextpackets
      @plaintextpackets Před dnem

      Wireshark records the data as its leaving to the network adapter so everything that will be encrypted by the application layer is already encrypted.

  • @codeman99-dev
    @codeman99-dev Před dnem

    Don't need root/admin access if you don't mind sending just 16 bytes per ping. Simply use the "pattern" option.

  • @claussanta2341
    @claussanta2341 Před dnem

    Resolve DNS locally and then proxy out.

    • @plaintextpackets
      @plaintextpackets Před dnem

      Your local DNS server still needs to talk to one upstream

  • @collinhowell2064
    @collinhowell2064 Před dnem

    DNS over TLS? it would encrypt your traffic to DNS, most home routers can do it.

  • @TecraTube
    @TecraTube Před dnem

    what of your VPN is your own wire guard server on a cloud server? running pfsense as firewall with VPN there as well as the your local machine running client

    • @plaintextpackets
      @plaintextpackets Před dnem

      You could do this, that secures the server from logging but the traffic itself can be sniffed by the cloud hosting provider

    • @pedrol71
      @pedrol71 Před 5 hodinami

      @@plaintextpackets and what if I deploy my own VPN Wireguard server on my own network, say on a Docker Container or on a Raspberry PI ?

  • @fastmover45
    @fastmover45 Před dnem

    Get a Rasberry Pi and run Pihole for filtering of ads and cloudflare TLS / DNS over HTTPs. This solves a lot of DNS security problems as well as removing the adverts from all the LAN side of your network .

  • @m4a1mag
    @m4a1mag Před dnem

    ur videos are crazy good i could watch em all day

  • @ren3059
    @ren3059 Před dnem

    Your channel is underrated and extremely helpful. I'm curious if using Quad9 DoH (DNS over HTTPS) or DoT (DNS over TLS) makes a difference compared to using a VPN?

    • @plaintextpackets
      @plaintextpackets Před dnem

      Secure DNS is helpful as it encrypts the queries so your ISP (or other snoopers) wouldn’t be able to see them on the wire. But the owner of the DNS server will so that’s the trade off

    • @Aksubs807
      @Aksubs807 Před dnem

      Sorry, but I don't know much, the DoH and DoT are used to encrypt DNS queries and responses right?. As these queries are encrypted, ISP can't see DNS query responses, but after my machine got the DNS response, now the ISP will know "Where" I'm going, cause now the ISP has to route the traffic to that destination server. Is this true???

    • @claussanta2341
      @claussanta2341 Před dnem

      Think of sending a package to someone. Works "kind of" the same. If the 📦 isn't see through ISP just sees the destination address etc. Make yourself a pihole and look up your DNS traffic. Interesting to see, really.

  • @shaunrowley7230
    @shaunrowley7230 Před dnem

    Thank you a very interesting video and agree about VPN's as from what I have read need to ensure that the VPN service you use does not log your where and what. Another source such as Network Chuck has suggested using Proxy Chains to hide your identity would this be detectable in wireshark?

    • @plaintextpackets
      @plaintextpackets Před dnem

      There are many vpn services that advertise they don’t log, but frankly I don’t trust that. TOR (a proxy chaining solution) is the closest thing to true privacy but the trade off is performance which is horrible

    • @TecraTube
      @TecraTube Před dnem

      network chuck is a douche.

  • @drakezen
    @drakezen Před dnem

    I guarantee that everything you do on the internet is being collected. Anything you type, see or do is being sold and tracked by the government

  • @samosamz4485
    @samosamz4485 Před 2 dny

    Your monitoring solution is great. Love the graphics. But finding the speedtest is not good.

  • @JB-fh1bb
    @JB-fh1bb Před 4 dny

    Something that a lot of people miss when installing tools like this and reporting to ISPs: Bufferbloat. If you or someone in your household (or even a device you think is offline) is saturating either your upstream OR downstream bandwidth these tools will report packet loss, high pings, wild jitter, pretty much everything. Also: it’s very important to run this from a wired connection directly connected to your router. Testing over wifi is bad practice and might get a permanent note on the account at your ISP.

  • @adamsheldrick
    @adamsheldrick Před 4 dny

    I really need to join the discord - thank you for this

  • @Avinaes_
    @Avinaes_ Před 5 dny

    Great video! Very informative :)

  • @TheLazyJAK
    @TheLazyJAK Před 5 dny

    Not sure if it's just CZcams acting up, but the audio levels for the gameplay seem very high.

    • @plaintextpackets
      @plaintextpackets Před 4 dny

      First time recording gameplay also shell shockers generally loud

  • @50PullUps
    @50PullUps Před 5 dny

    Wtf is with that shark’s gun?

  • @98854arjun
    @98854arjun Před 5 dny

    Very well explained

  • @jhc4090
    @jhc4090 Před 6 dny

    Great video! Thanks for sharing.

  • @notsocc
    @notsocc Před 6 dny

    I hit a bump in that Grafana wants to use port 3001 which is already being used by Uptime Kuma on my setup. What other port could I use, and how to I change that value in setup? Thank You!

  • @thecurious6721
    @thecurious6721 Před 7 dny

    Thank you for the great tutorials 👍🙏 They are the best!

  • @CortVermin
    @CortVermin Před 8 dny

    port scan an issue? when you have a server on the internet you get portscanned like... 16 times. per second.

  • @notaras1985
    @notaras1985 Před 8 dny

    Best networking channel ❤

  • @prajwalsa7568
    @prajwalsa7568 Před 8 dny

    I can use intrnet browsing also but wifi networks not showing on to right plz help in laptop kali linuxx

  • @prajwalsa7568
    @prajwalsa7568 Před 8 dny

    I am using internet but not showing wifi networks in desktop plz help in laptop

  • @petersimmons7833
    @petersimmons7833 Před 8 dny

    Wow. This is unbelievably polished. I appreciate it when I can use a git command plus a docker compose command and it just works. I definitely spread this among some friends.

  • @Yayaisbadatchess
    @Yayaisbadatchess Před 9 dny

    This channel is pure gold

  • @TonoNamnum
    @TonoNamnum Před 9 dny

    And it's 65535 because that's the maximum value you can fit in 2 bytes. In other words 2^16 = 65536. It's one less than that because port 0 is not used.

  • @RowanHawkins
    @RowanHawkins Před 9 dny

    65,535 is the total number of ports on any system. Ports below 1,024 originally designated to be fixed services. With some very low ports being really basic things for an operating system to recognize echo(4) or character gen(7). The IETF originally designated those ports in an RFC. And originally you were supposed to register your application for one of those low bit ports if it was going to be a regular standard service on multiple systems. That idea kind of went up in flames mid-90s time frame because nobody paid any attention to it. Ports above 1024 are Dynamic and are used by applications for whatever needs they have for additional ports freeing up the initial connection port for another device to connect to it. As a funny note you use those low 3 bit ports to check if a system is alive when icmp is disabled/firewalled.

  • @mangasubamuhamed9817
    @mangasubamuhamed9817 Před 11 dny

    thank you very much for the video, it's really helpful

  • @mangasubamuhamed9817
    @mangasubamuhamed9817 Před 11 dny

    thank you

  • @samosamz4485
    @samosamz4485 Před 12 dny

    14:35 it may break the internet 😂😂

  • @sione5754
    @sione5754 Před 13 dny

    grafana wont load

  • @sione5754
    @sione5754 Před 13 dny

    Error response from daemon: failed to create task for container: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: error mounting "/run/desktop/mnt/host/c/netprobe/config/grafana/dashboards/netprobe.json" to rootfs at "/var/lib/grafana/dashboards/netprobe.json": mount /run/desktop/mnt/host/c/netprobe/config/grafana/dashboards/netprobe.json:/var/lib/grafana/dashboards/netprobe.json (via /proc/self/fd/6), flags: 0x5000: not a directory: unknown: Are you trying to mount a directory onto a file (or vice-versa)? Check if the specified host path exists and is the expected type

  • @sione5754
    @sione5754 Před 13 dny

    sooooo waffly

  • @rootcode
    @rootcode Před 13 dny

    wow

  • @kwhvnz
    @kwhvnz Před 14 dny

    great vid! what do you use to create your thumbnails?

  • @rssszz7208
    @rssszz7208 Před 14 dny

    Please time stamp

  • @saintpatrickmaloney7176

    Is there a way to run it with out docker. I have a Ubuntu server and Prometheus with Grafana installed on it. could you please make a video about it please.

    • @plaintextpackets
      @plaintextpackets Před 15 dny

      Currently you can’t run it without docker but you can run just the probes and then connect external Prometheus and grafana. If interested join the discord to get help

  • @mrjakob853
    @mrjakob853 Před 15 dny

    Are the IP-address you’re sending the packets to, the victims phone IP, or your own? Btw, love the video❤️

  • @mrjakob853
    @mrjakob853 Před 15 dny

    Do you have another channel where I can follow you? Discord, Reddit?

  • @user-ui6et3xp4h
    @user-ui6et3xp4h Před 15 dny

    Just get google pixel phone which come with google vpn

    • @illa109
      @illa109 Před 14 dny

      Rent a server (5-7$ a month) set up and configure your own.

    • @user-ui6et3xp4h
      @user-ui6et3xp4h Před 14 dny

      @@illa109 is there a video to demonstrate the setup?

    • @illa109
      @illa109 Před 13 dny

      @@user-ui6et3xp4h look up how to setup Wireguard or OpenVPN on a VPS server

  • @othernicksweretaken
    @othernicksweretaken Před 15 dny

    @05:07 Is this MobaXterm? I use it at work to jump from my virtualised Windoze Desktop to my Linux servers per ssh.

  • @AlexeyElishaVoloshin
    @AlexeyElishaVoloshin Před 16 dny

    Well presented and explained. Very enlightening! Thank you Mr. Plaintext Packets (I'd like to know your real name).