Documente Academic
Documente Profesional
Documente Cultură
ITWE433
(NETWORK SECURITY)
EXERCISE
2
PASSWORD CAPTURING USING WIRESHARK
__________________
Student Name
__________________
Date Performed
__________________
Date Submitted
What You Need for This Lab
Activity
version of Windows,
with Internet access.
You
need
administrator
LEGAL
WARNING!
Use only machines you
own, or machines you have
permission to hack into.
Hacking into machines
without permission is a
crime! Dont do it! If you
do illegal things, you may
be arrested and go to jail,
and I will be unable to
save you. These
instructions are intended to
train computer security
professionals, not to help
criminals.
The defect of non-switched Ethernet that we will exploit here is that every packet is
sent to every device on the hub, so your computer is able to read what other
computers send and receive. Most wired networks are now switched, but wireless
networks naturally send signals to every computer nearby, so this sort of attack
works well for them.
of
joe
and
Password
of
10. Do NOT put in your real user name and password! As you will see, this Web page is not
secure. After this lab, you might not want to use it anymore!
11. Click the "Log In" button. If you see a message asking whether to remember the
password, click "Not Now".
12. In the Wireshark window, box, click Capture, Stop.
16. Wireshark finds the text. It highlights a packet with a Protocol of HTTP, as shown
below on this page.
17. In the bottom pane of the Wireshark window the raw packet data is shown in
hexadecimal on the left and in ASCII on the right. The password is visible on the right
side, as shown in the figure below.
Password
Paste the two screen snapshots youve captured in this lab activity using MS-Word and
the answers to all the questions found in this lab activity. Save it using the filename
format:
ITWE433_firstletterfirstnameCOMPLETESURNAME_Lab02.docx
CONCLUSION:
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________