Coconote
AI notes
AI voice & video notes
Try for free
🔍
Network Traffic Sniffing Tutorial
Apr 25, 2025
Tutorial on Network Traffic Sniffing using Ettercap and Wireshark
Introduction
Objective
: Demonstrate how to capture network traffic using Ettercap and Wireshark to perform a man-in-the-middle (MITM) attack.
Scope
: Capture traffic from other computers, not just your own.
Context
: Useful for internal penetration testing.
Tools Overview
Ettercap
Purpose
: Versatile tool for network security.
Uses
: Man-in-the-middle attacks, network sniffing, protocol dissection.
Wireshark
Purpose
: Powerful packet analyzer.
Uses
: Capture and scrutinize network data.
Man-in-the-Middle Attack
Phase
: Considered part of reconnaissance phase by the presenter.
Method
: Attack routing tables within routing domain to collect data aggressively.
Demonstration of Attack
Setup
:
Cyrix level 3 server as the target.
Clone of Kali Linux as the victim box.
Tools Used
: Ettercap and Wireshark via eth0 network connector.
Execution
:
Start Ettercap in graphic interface mode.
Capture DHCP traffic and other broadcasts.
On victim box, attempt to log into Cyrix server with fake credentials.
Outcome
:
Ettercap captures username and password fields.
Wireshark confirms the capture.
Post-Attack Analysis
Wireshark Usage
:
Used for Passive information gathering.
Use statistics to identify communication endpoints.
Analyze packets and apply filters to focus on specific protocols or hosts.
Value
: Identifies high-value targets and maps internal network configurations more accurately.
Ethical Considerations
Permission
: Always have customer permission to conduct such attacks.
Guidelines
: Adhere to ethical and legal standards.
Conclusion
Wrap-Up
: Importance of responsible use of network sniffing tools.
Call to Action
: Subscribe, join Discord for more discussion on pentesting.
Disclaimer
: The tutorial is for ethical hacking and educational purposes only.
📄
Full transcript