sniffex.c code help
This is a program that works to sniff devices using pcap. The link to the code is here: sniffex
I have some questions that I would like to ask and I have attempted them and want to know if they are right.
Question 1
Collaborate Disseminate
This is a program that works to sniff devices using pcap. The link to the code is here: sniffex
I have some questions that I would like to ask and I have attempted them and want to know if they are right.
Question 1
I am trying to sniff the GPRS traffic because I have to execute a pentest over GPRS communications.
I was researching about GPRS and GSM sniffing and I saw that I can detect the traffic of GSM, knowing GSM bands, but I coul… Continue reading How can I sniff GPRS?
Situation: I am trying to intercept TCP (not HTTP) traffic on a Windows machine using Python. I am posting this question as most answers I was able to find teaches how to sniff traffic.
Normal operation:-
Machine A ===> M… Continue reading Intercept TCP traffic using Python
I have a question regarding the security level of using Google voice with OBI200. I believe they probably using XMPP protocol which provides no encryption. In a large scale can the VOIP packets be sniffed remotely without the… Continue reading monitoring VOIP packets with GV configured with obi200
This question is an exact duplicate of:
Sniffing traffic on a secured wifi connection
4 answers
I read here, but that was… Continue reading How does an open network without a password expose other connections? [duplicate]
How secure is it to use Bluetooth handsfree?
Can’t someone eavesdrop the signals and listen to the conversation?
Does encryption in Bluetooth secure the information?
Can I use anyother tool to secure more the Bluet… Continue reading Bluetooth security
I am trying to capture packets from other devices that are connected to the same network as I am. I know the difference between monitor mode and promiscuous mode (explained in this question), but for my purposes I feel that p… Continue reading Capture wireless traffic in PROMISCUOUS mode (not monitor mode)
I want to perform an excercise for session hijacking. I login to a website that does not use HTTPS (just plantext HTTP). The login achieved through a pop-up window.
Using Chrome developer tools I have the cookies details th… Continue reading Given this data, how to execute session hijacking attack?
I am examining network traffic to demonstrate how a password sent in clear HTTP (not HTTPS) can be retrieved from traffic.
However, I encountered a case for a website that I could not understand. The website does not use HT… Continue reading Why I can not find my clear text login credentials in Wireshark traffic
I have the following Packet of data received to a tablet via Bluetooth from a Sleep monitoring device:
0000 08 83 00 00 09 16 08 7d 09 16 08 7a 00 00 09 12
0010 08 7d 09 05 08 71 00 00 09 0d 08 69 09 08 08 61
0020 00… Continue reading Help to find the encryption on bluetooth sniffing [on hold]