Questions tagged [sniffing]

A sniffer is a program that monitors and analyzes network traffic.

176 questions
3
votes
2 answers

Does someone need to be connected to my network to sniff HTTP requests?

TL;DR Would a potential attacker need to have my Wi-Fi password and be connected to my network in order to read HTTP requests? Over the past year or so, I have made a few DIY home automation projects. Included in this is a garage door opener. The…
Rocco
  • 205
  • 1
  • 6
3
votes
2 answers

Does VPNs even protect ftp and virtual machines connections?

I have to go out for some days and I'll stay in a hotel. During these days I will also have to work on some websites code and VMs that call external APIs. Not being a system administrator nor a security specialist, my concerns are about someone can…
webose
  • 271
  • 1
  • 3
  • 8
3
votes
1 answer

Security onion only Seeing broadcast traffic and its own traffic

I am attempting to test my new security onion install. I have it set up on a static IP Ethernet adapter in a virtual machine with an IP of 10.0.3.47 When I go launch Sguill, it seems to work well enough, but it only sees traffic broadcasts to…
mberna
  • 133
  • 3
3
votes
0 answers

Can I detect unique identifiers from random radio chatter?

I am trying to find out if I can uniquely identify smartphones (I would like to find constant identifiers such as IMEI) by passively sniffing the cellular data frequencies. I know that sensitive data such as SMS/DATA/CALLS are generally encrypted.…
beppe9000
  • 555
  • 1
  • 4
  • 10
3
votes
2 answers

Counter measures against traffic sniffing inside a LAN

Here's the problematic I'm stuck with, in the next months I'm going to move in, in a little house in France. For the network connectivity the house owner decides to buy a single internet connection. So basically the ISP box is shared with 2 others…
CrƟwn
  • 41
  • 6
3
votes
4 answers

Can I set up a 3g/4g Connection Proxy for Table/Phone App Pen Testing?

I would like to set up a testing environment for smartphone and tablet apps that can intercept 3g/4g communications and provide a traffic dump. I'd like to see all the 3g/4g traffic coming from, or going to, the device. Wireless connections are…
David Scholefield
  • 1,824
  • 12
  • 21
3
votes
1 answer

How to redirect someone packets connected over the same wifi into my computer using Wireshark?

I am using Windows 10. I just installed Wireshark 2.2.1. I am connected over a wifi network with security type WPA2-Personal. Many people are connected on this same network. I have the password of this wifi. I would like to be informed about 3…
DataMiner
  • 31
  • 2
3
votes
2 answers

How to identify L2 devices in a Wide Area Network?

This is sample of a traceroute to google.com: TraceRoute from Network-Tools.com to 216.58.194.46 [google.com] Hop (ms) (ms) (ms) IP Address Host name 1 0 0 0 206.123.64.233 - 2 Timed out Timed…
R1W
  • 1,617
  • 3
  • 15
  • 30
3
votes
1 answer

Network packet obfuscation

Suppose I am wirelessly transmitting network traffic between a computer and a router. As I understand it, even though the traffic is encrypted, it is possible for a third party attacker to intercept the data packets and observe their basic…
Ubiquitous
  • 133
  • 6
3
votes
3 answers

How to sniff 802.11 packets without going into monitor mode?

Is it possible to sniff or capture 802.11 packets which sends my computer to the router (AP). I know that I can't sniff packets which have a other destination MAC address without going into monitor mode, but is it possible to capture and see the…
user126623
  • 159
  • 3
  • 8
3
votes
1 answer

Google Drive photo security and publicly visible lh*.googleusercontent.com

I thought Google Drive was more secure than this. If I upload a photo to Google Drive, I don't care that it's entrusted to them and I also assume someone working there can look at it. No big deal. However, for the rest of the world, I assume my…
ThisClark
  • 133
  • 1
  • 1
  • 6
3
votes
1 answer

Detecting unusual network activity

I have a small business network consisting of ca. 15 devices, a few switches and a two routers. Recently it occurred to me that all the security measures I have been doing are not very productive: I either block some ports (or to be more specific,…
simon
  • 133
  • 4
3
votes
1 answer

Securely read encryption key from NVRAM of TPM 1.2

I have configured a disk encryption in linux using LUKS with TPM with secure boot. The encryption key is loaded from TPM from NV memory using command TPM_NV_ReadValueAuth. The problem is that it is read as a clear text and it can be captured on LPC…
user1563721
  • 1,099
  • 11
  • 22
3
votes
1 answer

Can't decrypt captured HTTP connection from WPA Network

Hi I am attempting to sniff HTTP packet traffic using Wireshark on Kali Linux. I have added my wpa-pwd correctly to the IEEE 802.11 protocol and enabled "decryption". Currently I can only view the following traffic protocols: ICMPv6, ARP, MDNS,…
vector
  • 33
  • 4
2
votes
1 answer

Sniff LAN SSL requests

When I log in into Facebook, using Wireshark in the same machine, I can read the request data in plain-text. That doesn't happen when I'm sniffing my LAN: I can read the SSL packets but they are already encrypted. The only way to read these packets…
Sniffer
  • 21
  • 1
1 2
3
11 12