Legit TCP flows or hacking attacks? Can Wireshark help us to decode the flows and see if the traffic is malicious?

Wireshark course: https://davidbombal.wiki/chriswireshark
Nmap course: https://davidbombal.wiki/chrisnmap

// WIRESHARK FILE //
Download here: https://www.dropbox.com/s/pvytdvkvxl8b41n/SYNScan_GeoIP_ChrisGreer.pcapng.zip?dl=0

// MAXMIND //
How to: https://wiki.wireshark.org/HowToUseGeoIP
Maxmind: https://www.maxmind.com/en/home

// MY STUFF //
https://www.amazon.com/shop/davidbombal

// SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal

//CHRIS GREER //
Udemy course: https://davidbombal.wiki/chriswireshark
LinkedIn: https://www.linkedin.com/in/cgreer/
YouTube: https://www.youtube.com/c/ChrisGreer
Twitter: https://twitter.com/packetpioneer

// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: [email protected]

wireshark
tcp
tcp/ip
tcp ip
osi
tcp model
wireshark tcp
ccna
cisco ccna
nmap

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

#wireshark #tcp #nmap