<?xml version="1.0" encoding="UTF-8"?><oembed><type>video</type><version>1.0</version><html>&lt;iframe src=&quot;https://www.loom.com/embed/5156e05f822c4567a25e2b44f90a42d0&quot; frameborder=&quot;0&quot; width=&quot;1920&quot; height=&quot;1440&quot; webkitallowfullscreen mozallowfullscreen allowfullscreen&gt;&lt;/iframe&gt;</html><height>1440</height><width>1920</width><provider_name>Loom</provider_name><provider_url>https://www.loom.com</provider_url><thumbnail_height>1440</thumbnail_height><thumbnail_width>1920</thumbnail_width><thumbnail_url>https://cdn.loom.com/sessions/thumbnails/5156e05f822c4567a25e2b44f90a42d0-c1654e429b6e49af.gif</thumbnail_url><duration>1148.004</duration><title>Wireshark DNS, TCP Handshakes, HTTP Secrets Capture 🔍</title><description>In this lab, I walk through downloading and using Wireshark to monitor network packets for troubleshooting and spotting malicious activity. I capture a DNS lookup by running nslookup for google.com, then filtering DNS to show the A record query and reply with the IP match. Next, I show a TCP three way handshake by visiting a site and filtering TCP by the resolved IP to identify SYN, SYN ACK, and ACK. Then I demonstrate how cleartext HTTP can expose posted login credentials by filtering http request method POST and opening the signin page. I also show how to follow a TCP stream, and how to save packets and filters for later analysis.</description></oembed>