With all the buzz around DeepSeek AI, I threw a couple of packet captures at it to see if it could help with the analysis and find root cause. First we have to convert the pcap to a text file in wireshark for Deepseek to analyze it. I was actually pretty happy with the results, but I still had to dig deeper and fact-check the AI analysis. Almost there! You can download the first pcap and follow along here: If you like, please let me know!! It helps. Really. Want more packet goodness? == More On-Demand Training from Chris == ▶Getting Started with Wireshark - ▶Getting Started with Nmap - == Private Wireshark Training == Let's get in touch - 0:00 Intro 0:30 TLS Version problem 1:40 Convert pcap to txt 2:20 DeepSeek upload and analysis 3:38 How about a harder one? 4:40 DeepSeek vs TCP Resets 5:40 AI didn't get this part 6:58 The verdict!











