Wireshark Tip 4: Finding Suspicious Traffic in Protocol Hierarchy

preview_player
Показать описание
Рекомендации по теме
Комментарии
Автор

Thank you for this video, but I’m not seeing the join and the “IRC” traffic. I’m guessing it is in the data at the bottom and that is why I cannot see it.

vicky
Автор

great i see high ipv4 udp data perect packets and some tcp data packets. But i cant tell if they are good or bad.

FrostDagger
Автор

These videos are great. Please keep making wire shark videos

RedBlueLabs
Автор

Thanx for the video I have question: is their any tool that would do suspicious activity scan for any pcap files. this will save much time

ibrahima
Автор

I have Data sitting under HTTP... is this the same?

smokescreen
Автор

what is the use of wireshark tool in intrusion detection system

nileshmanit
Автор

how do i find and detect someone using torrent with wireshark

Aloesink
Автор

Thank You so much, best wishes from Afghanistan

ZLearna
Автор

I want to know where in Wireshark should I look to find and verify a file has been downloaded from an HTTP GET Request

barryabrams
Автор

What if Data appears under UDP?
Is it the same impact?

Junior-ryvr
Автор

can in have the pcap files used for demonstration?

sukanta
Автор

Your book is hard to read. Kind of vague descriptions.

tahersadeghi
Автор

we are tired of all these corrupt people

camilladevivenot
Автор

What language is she speaking? It sounds close to English but not enough to understand!

hotlips
Автор

Here is what I see in my TCP Stream. What's does it mean?


taofeekolayinkaagboola