Wireshark for Ethical Hackers - 7

Networking of Sniffing Crash Theory Practice - Part 3

Active Sniffing vs. Passive Sniffing

  • Active Sniffing relies on sending some frames, performing MITM-attacks
  • Passive Sniffing means that the sniffing host only sniffs
    • Unicasts may be sniffed within the Collision domain
    • Broadcasts and (sometimes) multicasts may be sniffed within the whole Broadcast domain(VLAN)
  • Totally passive sniffing
    • Ways to perform the totally passive sniffing:
      • Receive-only UTP cable (Wall jack)
      • Tap: L1 device - Allows to view malformed frames, L1/L2 errors. Professional taps may support 1 Gbit, 10 Gbit or better
      • Firewall: outbound
      • Manipulations with TCP/IP: Disable TCP/IP on Windows, no IP address on Linux
      • Technologies like Port Mirroring

View Telnet passwords

  • Client-server protocol
  • Used for the remote administration
  • TCP port 23
  • No encryption
  • Use SSH if possible
  • Still popular

Practice case: The user telnets to Router2 from Router 1, types his passwords and then views the router configuration. The eavesdropper with Wireshark will try to sniff this and get the passwords.

Set up a testing lab.

image-20220318153745074

Start Wireshark to capture packet.

image-20220318154022737

Run the console on Router1.

Router1#telnet 10.0.0.102
Trying 10.0.0.102 ... Open


User Access Verification

Password:
Router2>en
Password:
Router2#sh running-config

image-20220318154741100

Stop capture and filter "telnet".

image-20220318155140267

Right click and select "Follow TCP stream". We can the password - Password

image-20220318160723810

posted @ 2022-03-18 16:11  晨风_Eric  阅读(19)  评论(0编辑  收藏  举报