Jump to content

Kali/wireshark on a VM


Skyrunner

Recommended Posts

In which case you would need to at least see the four way handshake to be able to decrypt traffic as it is in there that the key used to encrypt the traffic is generated. I don't know if wireshark can decrypt multiple streams on the fly even if you did have the handshake. I usually set the key in wireshark only for post processing pcap files.

I'd suggest removing all encryption and starting there, when you understand how things are working at that level then think about adding encryption.

Link to comment
Share on other sites

  • 3 weeks later...

Ill give you an idea of how I started.

My AP at home - connects all my little devices and computers.

Taking my Kali VM, i plug in my TP-LINK WN 722N (USB) which becomes a wireless card inside kali only (mac doesnt recognise it)
The VM is not in bridged mode or anything. it has no network connection to my AP, has no IP address.

Now - using my TPLink card - I connect kali to my AP - i now have a IP address - at this point your now able to start seeing traffic on the network.

at this stage you could use wireshark, or ettercap or a host of other apps that review the traffic.

...... what Im astonished is there is a course for this? now someone tells me. lol

Link to comment
Share on other sites

Ill give you an idea of how I started.

My AP at home - connects all my little devices and computers.

Taking my Kali VM, i plug in my TP-LINK WN 722N (USB) which becomes a wireless card inside kali only (mac doesnt recognise it)

The VM is not in bridged mode or anything. it has no network connection to my AP, has no IP address.

Now - using my TPLink card - I connect kali to my AP - i now have a IP address - at this point your now able to start seeing traffic on the network.

at this stage you could use wireshark, or ettercap or a host of other apps that review the traffic.

...... what Im astonished is there is a course for this? now someone tells me. lol

I don't think it's going to cover just things like sniffing but rather the ethics and a load of other stuff. Here's what we're going to be studying:http://www.ljmu.ac.uk/courses/undergraduate/2014/cyber-security

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...