Advertisement

Login Page Passwords & Usernames Sniffing W/ WireShark "Capture & Read Unencrypted Traffic"📈đŸĻˆ

Login Page Passwords & Usernames Sniffing W/ WireShark In this video we show you how to grab and read http packets from login requests this traffic is unencrypted becuase it uses the http protocol instead of the https protocol so we can read in clear text usernames and password that are sent over the wire this will also work for other unencrypted protocols like FTP, Telnet and of course HTTP their are others as well it's always a good idea to have a packet sniffing tool running during a internal pentest no matter what approach your taking or what you are trying to do you may get lucky and capture credentials and gain access to FTP or Telnet or a admin login page giving you the means to gain access and further exploit the victim devices or applications.
*Find Me*
Discord Data Zero #5569
Instagram @pwned_exploit
Twitter @Stealth_data_0
Facebook Stealth Data Zero


*related videos*
MITM attack and capture packets. Imagine and other data using Diftnet & Ettercap.


How to use Bettercap MITM tool to grab passwords sniff packets see ip address device types and more.



Getting started with wireshark the rundown of the basics.



Network reconnaissance no authentication grab and capture and read packets to gain information from other networks around you.



#wireshark #cybersecurity #cybersec

WireShark,password,sniffing,packet,gain,grab,capture,username,usernames,passwords,using wireshark,wire,shark,2019,kali linux,login,admin,telnet,ftp,unencrypted,traffic,read,

Post a Comment

0 Comments