官术网_书友最值得收藏!

Capturing traffic

Learning how to use packet-capturing tools is vital for any security professional. We will cover two packet capturing tools in this section: Wireshark (GUI-based) and tcpdump (CLI-based).

Before we begin using these tools, let's take a step back to understand why there will be a need to capture traffic when performing a penetration test. Network traffic travels in packets, and each packet holds a number of fields that contain the information it needs to travel across the network and perform a certain function. Performing a packet capture (or packet sniffing) will allow you to view the structure of the packets, plus any data that is available. Some protocol traffic is unencrypted, such as FTP. This will allow you to see the username and password in clear text.

Packet sniffing is a type of wire tap that is applied to computer networks. You can liken this to phone tapping, where a conversation is spied on.
主站蜘蛛池模板: 伊川县| 扬州市| 辰溪县| 常州市| 金秀| 宣汉县| 明光市| 留坝县| 吴川市| 大宁县| 米脂县| 沅陵县| 银川市| 钦州市| 神池县| 新野县| 庆阳市| 赤峰市| 荣成市| 桑日县| 盐山县| 夏津县| 景谷| 肇州县| 达尔| 阿拉善左旗| 肇庆市| 班玛县| 家居| 河津市| 客服| 方山县| 乌拉特中旗| 汕头市| 龙陵县| 独山县| 渝北区| 陆良县| 麻城市| 海伦市| 延寿县|