0% found this document useful (0 votes)
25 views

Activity # 8-A Pen Testing

Joey D. Bay-an completed Activity #8-A which involved using a penetration testing tool to verify if login passwords could be sniffed from unauthorized network users. The procedure involved using Wireshark to capture network traffic, filter the traffic for post data, and analyze the packets to find usernames and passwords. Wireshark allowed the live capture and analysis of network packets, including the identification of a captured password. Wireshark is an essential security tool that allows analysis of network traffic in real time.

Uploaded by

joneil lucas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Activity # 8-A Pen Testing

Joey D. Bay-an completed Activity #8-A which involved using a penetration testing tool to verify if login passwords could be sniffed from unauthorized network users. The procedure involved using Wireshark to capture network traffic, filter the traffic for post data, and analyze the packets to find usernames and passwords. Wireshark allowed the live capture and analysis of network packets, including the identification of a captured password. Wireshark is an essential security tool that allows analysis of network traffic in real time.

Uploaded by

joneil lucas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Name Bay-an, Joey D.

Date 11/12/19
Section Block-A Score

ACTIVITY # 8-A
PEN TESTING
A. OBJECTIVE: Using a penetration testing tool, verify if a log-in password or access code in
particular site can be sniffed or grabbed by unauthorized net users
B. PROCEDURE (see procedure attached to this worksheet)

C. OUTPUT
1. Profile of pen testing software used

2. Steps in sniffing password


Step 1: In the wireshark go to capture.

Step 2: Filter captured traffic for post data.

Step 3: Analyze post data for username and password.

3.Capture interface
4. Starting live capture:

5. Filtered captured packets:

6. Selected captured packet:


7. TCP stream analysis:

8. Captured password:

D. GENERALIZATION
Wireshark is the network traffic analyzer, and an essential tool for any security professional

or systems administrator. This free software lets you analyze network traffic in real time,

and is often the best tool for troubleshooting issues on your network.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy