Skip to main content

Fun With Wireshark: Packet Analysis and Ethical Hacking Part 2


This section covers hacking!

Remember: I'm taking only a sliver of the information presented to give employers a better idea of what I know and am capable of learning, not copying someone's course word from word.

You know why we don't use Telnet anymore?

Because of this. This is in clear text.




That's part of the password in clear text. You can even see commands used after telnetting in.

Remember that follow TCP command on a packet?






That's plain text. Remember to encrypt the password with the command enable secret [password] in Cisco CLI. (Can we see GRE in Wireshark?)

Bombal is using GNS 3 - Can we use Wireshark captures in Packet Tracer?

Later, packet capturing with TFTP - so we Follow UDP.





Now, with FTP, capturing the UN and PW is easy as 1-


There is no 2 and 3.

You need not even click follow on a packet, but you can if you want.


VOIP SNIPE




Skinny client control protocol is TCP - the traffic between two IP phones and a router.

Check the state of Skinny calls by clicking (Near the top) Telephony -> VoIP calls and play them.

Comments

Popular posts from this blog

What Do You Need? [AKA; List of Offered Services / My Next Role] (2020)

I am a trusted outsourced remote consultant for your company.   I enjoy having the flexibility to take on temporary projects from time to time! I start at part-time, temp work for now. If we like each other, we can renegotiate. If anything sounds weird, out there, or unusual - Feel free to e-mail me .  3 Services Offered Writing :      You want to pay me to write more of *waves hand* this blog? I am game .     I write B2C e-mails going out to over 280 people weekly. [ Example Job Description ]        Auditing :        Something doesn't work on your page or in your app. I can find it, or you can lose business. [ Here ] [ Example Job Description ]   I really enjoy testing apps and webpage concepts! I have an iPhone and Android phones ready. Technical: Still as-needed, always remote, contract, or temporary. IT Operations Tech [ Example Job Description ]     Hardware and SaaS support.     Cisco routing and switching (Networking). CCNA, A+, Sec+, Azure certified WORKING ON: Junos

Portfolio of UX/Product Feedback [Vol. 1]

I browse websites and apps, while making note of things I find frustrating for end users. You have probably been linked here from a form or my resume. If you have any questions about what I'm looking for in a role, click here .   This post is not to shame, but to point out errors and hopefully make my talent for finding and documenting such mistakes clear to someone hiring. Contents: Instances where I offer constructive feedback on someone's website, logo, or app. Actions that were taken by the developers or artists.  I'm glad you want your webpages to be the best they can be with my help; If you need your sites audited, e-mail me . Latest Update -  November 20th, 2020.   Vol. 2 is here .

Contactless Tech’s Role in the New Guest Experience ft. Intelity and The George

 Contactless hospitality technology is growing. You want to get away, and you'll be damned if a little thing like a deadly virus will stop you! But you still don't want to touch things. Ew. During the chat between INTELITY CEO Robert Stevenson and THE GEORGE Director of Operations Kerrie Hunter, you’ll learn how the historic boutique hotel has adapted a mobile-first guest experience in the wake of COVID-19—and how they see contactless technology affecting the future of hospitality. I don't remember how I found INTELITY (probably hoping to score a position with them), but I liked them enough to stay on the e-mail lists.