Jump to content

Search the Community

Showing results for tags 'wireshark'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Hak5 Cloud C²
    • Plunder Bug
    • Bash Bunny
    • Signal Owl
    • USB Rubber Ducky
    • Packet Squirrel
    • LAN Turtle
    • Screen Crab
    • Shark Jack
    • Key Croc
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 8 results

  1. So I tried using my Plunder Bug on my PC sniffing another PC and it is not showing up on Wireshark. I did try muting and unmuting the device via PowerShell and it still wouldn't show up Attached is a screen shot of Wireshark and my capture options Any ideas? Thanks
  2. Hello, I would like to capture the data stream to my LG oled TV. There is a LAN cable from the router to the TV. The TV uses WebOS rather than an Android operatiing system. I'm not that familiar with Wireshark, but there seems to be a possibility using Wireahark in Promiscuous mode. My router is a Talon AD7200 (TP-Link) and is probably a switch, not a hub. Windows recognizes the TV in the Network section, but I can't make the identification in Wireshark.
  3. Hi How would I adjust the timestamps in a pcap, using NTP packets(also in same pcap)? I’ve used wireshark, but it doesn’t save the new time offset🤔
  4. I have noticed that some of my connections aren't secure for over a few months now. My antivirus also keeps saying there are some network vulnerabilities. (Something about DHCP and it wants me to update the router firmware) I suspected that it has been monitored for a while now but, last night confirmed it. I was watching porn on my phone and I heard them laughing in the room next to mine. I wasn't sure if it was related and I heard one of them saying "He keeps on pausing and screenshotting it". I wanted to test to see if what I did on my phone would cause more laughter so I started looking up weird fetishes and they laughed even harder. I'm so embarrassed and I also feel very angry. Should I feel entitled to internet security when he owns the router? We all contribute to the internet bill so I would think that I'm entitled to some network privacy but, it would seem that they view it as "anything goes". I don't know what to do and I need your help. I really want to get back at them but, I don't know what to do. I thought of downloading a virus on a virtual machine so that it also downloads on their machine too (if they're downloading all my packets). If you have any questions for me, feel free to ask. I'm not very experienced in networking but, I'm willing to learn. P.S. I do have a VPN but only on my Windows PC
  5. Hi It’s been a while since I’ve played with wireshark....Looking for a guide on how to adjust timestamps in PCAP files using NTP packets. I know in the past when I’ve done this, I was unable to save with the new timestamps😔 can someone please advise?
  6. Hello, I'am wondering if following setup would be possible 1x throwing star TAP 1x Packet squirrel Action: Connect both Ethernet cables for sniffing from throwing star to packet squirrel and capture network traffic for both interface to one pcap file Appreciate if anyone can confirm this :)
  7. Hey all, I'm new, had the LAN turtle for about three weeks and I'm loving it. I have limited knowledge of the RF spectrum and I'm new to networks etc, but I've learnt so much by solving problems as I've gone along. However one thing I'm stuck with is setting up an SSH tunnel to the turtle remotely, in order to get a more diverse capture than I believe URLsnarf is capable of. Current setup Windows 10 putty (and/or Kali in Vbox) SSH to a digitalocean VPS SSH into my turtle remotely. I've searched the forums and googled for "wireshark remote ssh capture" etc, but everything I find seems either irrelevant or goes way over my head. From what I did understand it seems like I may not be able to do it. And I figured if it was possible, wouldn't everyone be using Wireshark instead of URLSnarf (which seems basic to me) Questions Do any of you gurus know if it is possible to get a relatively comprehensive live capture from the LAN turtle via SSH? Has anyone done this yet?
  8. I'm doing a bit of research using Wireshark to examine the behavior of the Tetra in different modes of operation. I'm getting results, but I don't trust that my equipment is reacting fast enough to the packets being broadcast. Can anyone tell me the rate at which the broadcast packets occur (number / sec) when the Pool Interval is set to Normal and the order the SSIDs are broadcast. With my Wireshark capture it indicates a rate of roughly 40 packets per second. Also, from the packet capture it looks as though the SSIDs start out broadcasting alphabetically, but as the capture progresses, SSIDs begin to get broadcast more randomly. The randomness is what makes me think I'm not seeing everything. If I'm not seeing everything, this brings up a bigger question. Can the devices being targeted in the wild keep up with all those broadcasts? Would it be better to start slowing down the Pool Interval for a more productive chance at snagging a targeted client? All fun things I hope to explore. Edit: If you're curious about the other two settings, I'm currently getting 7 to 10 SSIDs broadcast per second at the low interval and approximately 100 per second at Aggressive.
×
×
  • Create New...