官术网_书友最值得收藏!

  • Learn Penetration Testing
  • Rishalin Pillay
  • 156字
  • 2021-06-24 14:09:19

Capturing traffic

Learning how to use packet-capturing tools is vital for any security professional. We will cover two packet capturing tools in this section: Wireshark (GUI-based) and tcpdump (CLI-based).

Before we begin using these tools, let's take a step back to understand why there will be a need to capture traffic when performing a penetration test. Network traffic travels in packets, and each packet holds a number of fields that contain the information it needs to travel across the network and perform a certain function. Performing a packet capture (or packet sniffing) will allow you to view the structure of the packets, plus any data that is available. Some protocol traffic is unencrypted, such as FTP. This will allow you to see the username and password in clear text.

Packet sniffing is a type of wire tap that is applied to computer networks. You can liken this to phone tapping, where a conversation is spied on.
主站蜘蛛池模板: 大渡口区| 普宁市| 晋中市| 临夏市| 莒南县| 宝坻区| 托克托县| 唐山市| 大石桥市| 友谊县| 黄浦区| 沂南县| 浮梁县| 伽师县| 濉溪县| 蓬莱市| 丽江市| 芦山县| 崇明县| 虹口区| 遵化市| 宜宾县| 云龙县| 逊克县| 波密县| 巨野县| 岳阳县| 鸡东县| 黄山市| 苏州市| 兴化市| 东平县| 郑州市| 合肥市| 上高县| 锡林浩特市| 安丘市| 郯城县| 重庆市| 东辽县| 宁蒗|