bobtheman Posted March 25, 2012 Share Posted March 25, 2012 Using either just wireshark on my unencrypted AP or playing around with mk4 (all on my own machines and data), I can capture packets using wireshark very easily. Im familiar with using wiresharks filtering features to kick out all of the probe requests and beacon frames. However im having a hard time finding any interesting data with all of the packets. Can anyone suggest any guides or is there a tool that will extract data from a pcap ? Quote Link to comment Share on other sites More sharing options...
Infiltrator Posted March 25, 2012 Share Posted March 25, 2012 If you are looking into reconstructing the data, network miner will allow you to do that. Quote Link to comment Share on other sites More sharing options...
int0x80 Posted March 25, 2012 Share Posted March 25, 2012 I generally set filters for ports that have commonly used protocols which are plaintext. Think HTTP, SMTP, POP3, IMAP, FTP, et al. Quote Link to comment Share on other sites More sharing options...
digip Posted March 26, 2012 Share Posted March 26, 2012 Depends on what you are looking for, but Network miner is good for some file types, while others require more searching, like MP3's with no proper headers, but have partial ID3 tags, you can sometimes follow a stream of data in raw packet mode, make it from sender to you, filtering all replies, then save, and edit it in binary mode to remove http headers and give it the proper extension for file type to open them, like pictures, audio, executables, etc. @int0x80 - Would you be able to do file carving the same way you did on deleted files, with pcap files? I imagine if you wrote a tool to filter packet streams by the associated sessions, you could then reconstruct its files, while having something look for know file types, you would just first have to separate all streams/syn/ack/rst's in ordered frames per conversation and then filter for only received data vs replies to sender. Quote Link to comment Share on other sites More sharing options...
Infiltrator Posted March 26, 2012 Share Posted March 26, 2012 @int0x80 - Would you be able to do file carving the same way you did on deleted files, with pcap files? I imagine if you wrote a tool to filter packet streams by the associated sessions, you could then reconstruct its files, while having something look for know file types, you would just first have to separate all streams/syn/ack/rst's in ordered frames per conversation and then filter for only received data vs replies to sender. I like where this is going.... Quote Link to comment Share on other sites More sharing options...
int0x80 Posted March 26, 2012 Share Posted March 26, 2012 @int0x80 - Would you be able to do file carving the same way you did on deleted files, with pcap files? I imagine if you wrote a tool to filter packet streams by the associated sessions, you could then reconstruct its files, while having something look for know file types, you would just first have to separate all streams/syn/ack/rst's in ordered frames per conversation and then filter for only received data vs replies to sender. Yes, to do this I use tcpxtract. In fact, I showed how to extend tcpxtract to carve Windows executable files from a pcap in Hak5 S05E13 :] Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.