Follow us on Twitter!
Few are those who can see with their own eyes and hear with their own hearts. - Albert Einstein
Friday, April 18, 2014
Navigation
Home
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
Learn
Communicate
Submit
Shop
Challenges
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Other
Members Online
Total Online: 16
Guests Online: 16
Members Online: 0

Registered Members: 82822
Newest Member: TheBunter
Latest Articles
View Thread

HellBound Hackers | HellBound Hackers | Questions

Author

Wireshark save


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 14-08-08 07:05
The other day I was on a local machine at the network I seem to talk so much about and I captured some network packets using Wireshark and there were plenty of active computers. I have many mac addresses, IP's, including the mac and IP of a Cisco device.
I have never used Wireshark before and there are color coded outcomes. Some are red, some are green, purple, and some are plain old white. I am assuming the red must mean something important or unsecured. That's most likely all I need to know. And with the mac address of a Cisco firewall what could I accomplish? Full annihilation locally?


Author

RE: Wireshark save


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 14-08-08 07:21
here is one thing you can do with wireshark
http://samsclass.. . .ch3-10.doc

For more use google, theres lots of information about wireshark and its usages. Also look into ettercap for linux, or cain and able for windows. These simplify man in the middle attacks, which work really well to capture valuable data sent between a computer and a router ( then out to web ).

Edit: the colors mean different types of packets captured. For further info go here,
http://www.wiresh. . .ction.html,




Edited by on 14-08-08 07:25
Author

RE: Wireshark save


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 14-08-08 17:22
Oh yes I am familiar with MITM attacks. Actually I think the method is brilliant. I feel dumbed(not a word) by the fact that I didn't know Wireshark could preform MITM attacks.
I am use to using ettercap, which for you who don't use it, I highly recommend it.
Well thanks I am reading that .doc right now. Appreciate it.