Intro to Wireshark (PicoCTF 2022 #17 'packets-primer')

Sdílet
Vložit
  • čas přidán 13. 09. 2024
  • Help the channel grow with a Like, Comment, & Subscribe!
    ❤️ Support ➡ j-h.io/patreon ↔ j-h.io/paypal ↔ j-h.io/buymeac...
    Check out the affiliates below for more free or discounted learning!
    🖥️ Zero-Point Security ➡ Certified Red Team Operator j-h.io/crto
    💻Zero-Point Security ➡ C2 Development with C# j-h.io/c2dev
    👨🏻‍💻7aSecurity ➡ Hacking Courses & Pentesting j-h.io/7asecurity
    📗Humble Bundle ➡ j-h.io/humbleb...
    🐶Snyk ➡ j-h.io/snyk
    🌎Follow me! ➡ j-h.io/discord ↔ j-h.io/twitter ↔ j-h.io/linkedin ↔ j-h.io/instagram ↔ j-h.io/tiktok
    📧Contact me! (I may be very slow to respond or completely unable to)
    🤝Sponsorship Inquiries ➡ j-h.io/sponsor...
    🚩 CTF Hosting Requests ➡ j-h.io/ctf
    🎤 Speaking Requests ➡ j-h.io/speaking
    💥 Malware Submission ➡ j-h.io/malware
    ❓ Everything Else ➡ j-h.io/etc

Komentáře • 20

  • @ChrisGreer
    @ChrisGreer Před 2 lety +27

    Nice job John! Great Wireshark skillz my man. Woot Woot!! 👏👏 Love the "strings" function. Wow gonna use that when packet digging.

  • @drewzilla1263
    @drewzilla1263 Před 2 lety +2

    I can't get enough of these CTF challenges and more importantly, your videos explaining them. You could speed thru these and be like here's the flag ok thx bye. But that would just give the answer without any value and you take the time to explain this stuff. THANK YOU!!

  • @micleh
    @micleh Před rokem +1

    This video is a prime example of building up knowledge to reap benefit from it.
    Thanks again for the great content you provide.

  • @theFloxie
    @theFloxie Před 2 lety +7

    Beginner CTF/ "hacking" noob here interested in forensic side of things, these videos are fantastic! Been smashing through this playlist and picoctf challenges so far and really enjoying it!
    Super clear and concise explanations of the various tools and commands used, great stuff.

  • @manthanpatil6410
    @manthanpatil6410 Před 2 lety +4

    Thanks for that video dump

  • @OneMinExplains
    @OneMinExplains Před 2 lety +2

    congratulations sir for 400k.🥰🥰🥰

  • @teodorbriceanu8216
    @teodorbriceanu8216 Před 6 měsíci

    The way you explain is unbelievable....keep on going...and thank you for all your youtube content😅

  • @PhayulDigest
    @PhayulDigest Před rokem

    Thanks John, your walkthroughs are so awesome and very informative.

  • @catsandmountains
    @catsandmountains Před 3 měsíci

    Thanks dude, you helped me get my first flag!

  • @viv_2489
    @viv_2489 Před 2 lety +1

    This guy is a legend

  • @itsanantsingh
    @itsanantsingh Před 2 lety +3

    thanks man...really nice content.....ur channel reach ++ for yt algo

  • @sultanalrahbi2384
    @sultanalrahbi2384 Před 2 lety

    you are the best , big thanks to you.

  • @LearnTermux
    @LearnTermux Před rokem

    Bruh! your explaining skills:🔥

  • @piyushsahu4040
    @piyushsahu4040 Před 11 měsíci +1

    00:03 The challenge involves analyzing a pcap capture file
    01:39 Packet capture file contains network data that can be analyzed using tools like Wireshark.
    03:10 Wireshark provides detailed information about network packets, including IP addresses, protocols, flags, and packet contents.
    04:46 Computer A and computer B establish a connection and initiate a conversation.
    06:13 Wireshark has a feature to filter and display specific packets based on fields and flags.
    07:50 Plain text data present in the packet capture
    09:20 Running strings on network dump can help extract passwords and interesting information
    10:52 Wireshark can help analyze network traffic

  • @greyether777
    @greyether777 Před 2 lety

    Sweeet....thanks John!!

  • @marounahel8205
    @marounahel8205 Před rokem

    thank you

  • @LinuxJedi
    @LinuxJedi Před 2 lety

    domain name server **

  • @hakitajs9669
    @hakitajs9669 Před rokem

    In the end I think it makes more sense if you make the blank first, then show the pattern like:
    strings network-dump.flag.pcap | tr -d " " | grep -oE "picoCTF{.*?}"
    It's not much different, but I think it's a better view, especially if you have more messages.
    Overall great video, keep it up!!!