Lab Packet Sniffer
1. Install Protocol Analyzer Ethereal at http://www.wireshark.org/
2. Capture the packets at your Ethernet interface card.
3. Enter a login required website that you often go to, such as web mail. Don't use the real account or password.
4. Try to catch the packet that contains the password.
先利用wireshark過濾ptt.cc的封包
帳號密碼打入後123 123
全部都可以再封包紀錄
不論輸入任何字都可記錄下來
換成加密過的ssh
利用pietty這套軟體
帳號打入bbs就可切換去bbs模式
在wireshark中經過加密的資料
無法讀出來
2. Capture the packets at your Ethernet interface card.
3. Enter a login required website that you often go to, such as web mail. Don't use the real account or password.
4. Try to catch the packet that contains the password.
先利用wireshark過濾ptt.cc的封包
帳號密碼打入後123 123
全部都可以再封包紀錄
不論輸入任何字都可記錄下來
換成加密過的ssh
利用pietty這套軟體
帳號打入bbs就可切換去bbs模式
在wireshark中經過加密的資料
無法讀出來
留言
張貼留言