A sniffer is a program that monitors and analyzes network traffic.
Questions tagged [sniffing]
176 questions
3
votes
2 answers
Does someone need to be connected to my network to sniff HTTP requests?
TL;DR Would a potential attacker need to have my Wi-Fi password and be connected to my network in order to read HTTP requests?
Over the past year or so, I have made a few DIY home automation projects. Included in this is a garage door opener. The…
Rocco
- 205
- 1
- 6
3
votes
2 answers
Does VPNs even protect ftp and virtual machines connections?
I have to go out for some days and I'll stay in a hotel.
During these days I will also have to work on some websites code and VMs that call external APIs.
Not being a system administrator nor a security specialist, my concerns are about someone can…
webose
- 271
- 1
- 3
- 8
3
votes
1 answer
Security onion only Seeing broadcast traffic and its own traffic
I am attempting to test my new security onion install. I have it set up on a static IP Ethernet adapter in a virtual machine with an IP of 10.0.3.47
When I go launch Sguill, it seems to work well enough, but it only sees traffic broadcasts to…
mberna
- 133
- 3
3
votes
0 answers
Can I detect unique identifiers from random radio chatter?
I am trying to find out if I can uniquely identify smartphones (I would like to find constant identifiers such as IMEI) by passively sniffing the cellular data frequencies.
I know that sensitive data such as SMS/DATA/CALLS are generally encrypted.…
beppe9000
- 555
- 1
- 4
- 10
3
votes
2 answers
Counter measures against traffic sniffing inside a LAN
Here's the problematic I'm stuck with, in the next months I'm going to move in, in a little house in France. For the network connectivity the house owner decides to buy a single internet connection.
So basically the ISP box is shared with 2 others…
CrƟwn
- 41
- 6
3
votes
4 answers
Can I set up a 3g/4g Connection Proxy for Table/Phone App Pen Testing?
I would like to set up a testing environment for smartphone and tablet apps that can intercept 3g/4g communications and provide a traffic dump. I'd like to see all the 3g/4g traffic coming from, or going to, the device.
Wireless connections are…
David Scholefield
- 1,824
- 12
- 21
3
votes
1 answer
How to redirect someone packets connected over the same wifi into my computer using Wireshark?
I am using Windows 10. I just installed Wireshark 2.2.1. I am connected over a wifi network with security type WPA2-Personal. Many people are connected on this same network.
I have the password of this wifi. I would like to be informed about 3…
DataMiner
- 31
- 2
3
votes
2 answers
How to identify L2 devices in a Wide Area Network?
This is sample of a traceroute to google.com:
TraceRoute from Network-Tools.com to 216.58.194.46 [google.com]
Hop (ms) (ms) (ms) IP Address Host name
1 0 0 0 206.123.64.233 -
2 Timed out Timed…
R1W
- 1,617
- 3
- 15
- 30
3
votes
1 answer
Network packet obfuscation
Suppose I am wirelessly transmitting network traffic between a computer and a router. As I understand it, even though the traffic is encrypted, it is possible for a third party attacker to intercept the data packets and observe their basic…
Ubiquitous
- 133
- 6
3
votes
3 answers
How to sniff 802.11 packets without going into monitor mode?
Is it possible to sniff or capture 802.11 packets which sends my computer to the router (AP). I know that I can't sniff packets which have a other destination MAC address without going into monitor mode, but is it possible to capture and see the…
user126623
- 159
- 3
- 8
3
votes
1 answer
Google Drive photo security and publicly visible lh*.googleusercontent.com
I thought Google Drive was more secure than this.
If I upload a photo to Google Drive, I don't care that it's entrusted to them and I also assume someone working there can look at it. No big deal. However, for the rest of the world, I assume my…
ThisClark
- 133
- 1
- 1
- 6
3
votes
1 answer
Detecting unusual network activity
I have a small business network consisting of ca. 15 devices, a few switches and a two routers. Recently it occurred to me that all the security measures I have been doing are not very productive: I either block some ports (or to be more specific,…
simon
- 133
- 4
3
votes
1 answer
Securely read encryption key from NVRAM of TPM 1.2
I have configured a disk encryption in linux using LUKS with TPM with secure boot.
The encryption key is loaded from TPM from NV memory using command TPM_NV_ReadValueAuth.
The problem is that it is read as a clear text and it can be captured on LPC…
user1563721
- 1,099
- 11
- 22
3
votes
1 answer
Can't decrypt captured HTTP connection from WPA Network
Hi I am attempting to sniff HTTP packet traffic using Wireshark on Kali Linux. I have added my wpa-pwd correctly to the IEEE 802.11 protocol and enabled "decryption".
Currently I can only view the following traffic protocols: ICMPv6, ARP, MDNS,…
vector
- 33
- 4
2
votes
1 answer
Sniff LAN SSL requests
When I log in into Facebook, using Wireshark in the same machine, I can read the request data in plain-text.
That doesn't happen when I'm sniffing my LAN: I can read the SSL packets but they are already encrypted.
The only way to read these packets…
Sniffer
- 21
- 1