Skip to main content

Questions tagged [sniffing]

A sniffer is a program that monitors and analyzes network traffic.

1 vote
0 answers
62 views

I'm working on a protected Docker based lab with three containers for education purpose to run network tools like Ettercap to perform a MITM. Here's a snippet from my Dockerfile for the attacker ...
VZK's user avatar
  • 11
2 votes
1 answer
484 views

I really wonder if the password used in rtsp-adresses are used only to authenticate or also to encrypt. Let's assume I have a usual IP-camera and I stream its video over RTSP with usual user/password-...
anion's user avatar
  • 1,159
2 votes
2 answers
1k views

I am attempting to analyze the Bluetooth communication between a fitness tracker (GOJI ACTIVE GFITBK20 Activity Tracker) and its corresponding application (Goji Active) installed on my Android phone. ...
abdul's user avatar
  • 23
1 vote
0 answers
241 views

I recently bought a camera (for indoors home monitoring), and I got suspicious of its behavior data wise. It is set up like this: First you download and install an app called Lookcam onto your phone. ...
tfm's user avatar
  • 111
0 votes
0 answers
170 views

At work, I'm used to sniffing and capturing on network interfaces by which client and server intercom on LAN in my domain so as to grab genuine business data, followed by my customized replaying to ...
Y.Z's user avatar
  • 101
1 vote
0 answers
3k views

A couple of my friends have been in a kind of pickle recently. There have been attempts to hack their Telegram accounts and hackers somehow learned their one time pass codes but the login attempts ...
Artem S. Tashkinov's user avatar
0 votes
0 answers
23 views

I thought I would be protected from sniffing if I use a VPN, even in a setting where my traffic is going through a «man-in-the-middle» either by ARP poisoning or an evil twin attack. Now I was told, ...
Merc's user avatar
  • 101
0 votes
0 answers
85 views

I've been researching the main TLS 1.1 vulnerabilities, and from what I've seen, TLS 1.2 only improves the cryptographic hash functions, because TLS s 1.1 are broken. If these hash functions are ...
P00's user avatar
  • 43
3 votes
2 answers
1k views

I had a security concern with an unknown device on the network. If Wi-Fi is disabled and the network is strictly ethernet, assuming that no malware is deployed and it cannot be physically accessed by ...
Forward_Always's user avatar
1 vote
1 answer
756 views

I tried sniffing TLS web traffic on my own network and I always run against the following complications: I need to install an additional root cert on my devices I need to root my phone to do ...
user3280964's user avatar
  • 1,152
2 votes
3 answers
1k views

Let’s say I’m using http connection over a properly set up VPN with secure protocol and implementation. Then, most likely, the connection will be secure all the way until it exits the VPN server. But ...
Insnyt's user avatar
  • 21
2 votes
2 answers
368 views

I watched a documentary where hackers entered a victim's house by pretending to be from the ISP and then connected a box to a router in order to spy on all of the victim's traffic. Later, the hackers ...
Noodler's user avatar
  • 23
1 vote
1 answer
1k views

So the scenario is that we have a server shared with a number of users, with me being the server administrator and able to determine permission assignments. The server is running a service on loopback ...
Chaser hkj's user avatar
0 votes
0 answers
50 views

Picture a state of the art implementation of a website registration and login system. I'm interested in analyzing what a defender gains and loses by feeding the user password to a key-stretching KDF ...
Margaret Bloom's user avatar
0 votes
1 answer
1k views

Is fTPM more secure than a real TPM module when using Bitlocker? As far as I know, you should enable pre-boot authentication if you use a TPM module that is plugged separately onto the motherboard to ...
Opa114's user avatar
  • 101

15 30 50 per page
1
2 3 4 5
13