Skip to main content

Fun With Wireshark: Packet Analysis and Ethical Hacking Part 2


This section covers hacking!

Remember: I'm taking only a sliver of the information presented to give employers a better idea of what I know and am capable of learning, not copying someone's course word from word.

You know why we don't use Telnet anymore?

Because of this. This is in clear text.




That's part of the password in clear text. You can even see commands used after telnetting in.

Remember that follow TCP command on a packet?






That's plain text. Remember to encrypt the password with the command enable secret [password] in Cisco CLI. (Can we see GRE in Wireshark?)

Bombal is using GNS 3 - Can we use Wireshark captures in Packet Tracer?

Later, packet capturing with TFTP - so we Follow UDP.





Now, with FTP, capturing the UN and PW is easy as 1-


There is no 2 and 3.

You need not even click follow on a packet, but you can if you want.


VOIP SNIPE




Skinny client control protocol is TCP - the traffic between two IP phones and a router.

Check the state of Skinny calls by clicking (Near the top) Telephony -> VoIP calls and play them.

Comments

Popular posts from this blog

What Do You Need? [AKA; List of Offered Services / My Next Role] (2020)

I am a trusted outsourced remote consultant for your company.   I enjoy having the flexibility to take on temporary projects from time to time! I start at part-time, temp work for now. If we like each other, we can renegotiate. If anything sounds weird, out there, or unusual - Feel free to e-mail me . Doesn't have to be tech-related. I just have to find it interesting and flexible. 3 Services Offered Writing :      You want to pay me to write more of *waves hand* this blog? I am game .     I write B2C e-mails going out to over 280 people weekly. [ Example Job Description ]        Auditing :        Something doesn't work on your page. I can find it, or you can lose business. [ Here ] [ Example Job Description ]   Technical: Still as-needed, always remote, contract, or temporary. IT Operations Tech [ Example Job Description ]     Hardware and SaaS support.     Cisco routing and switching  Cloud Technician     Azure [ See tag ]  Support [Web: Example Job Description ] [Tex

Portfolio of UX/Product Feedback [Vol. 1]

Have You Looked at Your Webpage From the Customer's View Lately? You have probably been linked here from a form or my resume. If you have any questions about what I'm looking for in a role, click here .   This post is not to shame, but to point out errors and hopefully make my talent for finding and documenting such mistakes clear to someone hiring. Contents: Instances where I offer constructive feedback on someone's website, logo, or app. Actions that were taken by the developers or artists.  I'm glad you want your webpages to be the best they can be with my help; If you need your sites audited, e-mail me . Latest Update -  November 20th, 2020.   Vol. 2 is here .

Wireless Diagnostics on Mac OS; Packet Sniffing on a WLAN

There's a post sitting in my drafts about Wireshark and how to sniff packets out of the air that was going to be about sniffing for authentication packets for Wi-Fi hotspots that aren't broadcasting SSID (Which you shouldn't do apparently! It's still not safe). I was watching this video to find a little more information about how to properly use Monitoring mode on my Macbook to sniff for WLAN packets on the network. So when he said "Just open up Wireless Diagnostics and sniff your network (check your width and channel)." It was shocking to me.