Penetration Testing mailing list archives
Re: analysing captured packets
From: pagvac <unknown.pentester () gmail com>
Date: Sat, 01 Apr 2006 09:49:31 +0100
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I know that what I'm gonna say may sound silly, but what I recommend you is simply to play with analyzing traffic A LOT. Just watch the packets, filter them by protocol, IP address, or whatever you're interested in (Ethereal is great for filters). Try to follow different protocol "conversations" and try to understand what the requests and responses mean. Good luck on your sniffing experience my friend :-) Robin Wood wrote:
Hi Can anyone give any pointers to good tutorials on how to go about analysing network traffic captured during a pen-test. I'm currently using ethereal but I'm not necessarily looking for an ethereal tutorial more a howto on what to look for in capture files. Things like good protocols to spot (e.g. ftp logs in in plaintext so you can grab login details), how to recognise what is going on by watching the high level handshakes (e.g. a http get is usually followed by a response containing html), things like that. Thanks Robin ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ------------------------------------------------------------------------------
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFELj6ZjXB4hX6OC/cRAjvfAJ0Xrf9dLEPmdQ3LyJoK/0F2NqfLNwCdGmOk Rf9OvoDbOIWvdxk8/NfTuPA= =u9ZY -----END PGP SIGNATURE----- ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ------------------------------------------------------------------------------
Current thread:
- Re: analysing captured packets Stevo (Apr 02)
- <Possible follow-ups>
- Re: analysing captured packets Don Parker (Apr 02)
- Re: analysing captured packets pagvac (Apr 02)
- Re: analysing captured packets Robin Wood (Apr 02)
- Re: analysing captured packets Dan Goldberg (Apr 05)
- Re: analysing captured packets Robin Wood (Apr 05)
- RE: analysing captured packets Dean De Beer (Apr 07)