penetration testing - wireshark i want to sniff on local ip -


i have testing environment set @ home 2 pc´s.

pc 1 ip = 192.168.1.2

pc 2 ip = 192.168.1.4

gateway = 192.168.1.1

i sitting on pc 1.

both computers on internet. tried stuff like, going on google , searching, logging in on gmail, using youtube , other things aka. same.

i want sniff http traffic being send 192.168.1.4, many tries dident succed.

i tried apply filter: ip.src == ...1.2 && ip.dst == ...1.4

i tried use pc 2 wlan card , sniff on mac address, no luck.

all ever got weird traffic, no http traffic.

how win this?

you need perform kind of man-in-the-middle attack in order retrieve traffic target computer, unless sitting on router/switch/gateway. can achieved arp spoofing victim, , forwarding victim traffic through own machine , router. ettercap tool looking for: ettercap website. can run on windows , linux if on linux try:

# ettercap -tq -m arp /pc2// /gateway//

you should able see pc2 traffic in wireshark. have http aware, https require decryption of session.

hope helps.


Comments

Popular posts from this blog

html - How to style widget with post count different than without post count -

How to remove text and logo OR add Overflow on Android ActionBar using AppCompat on API 8? -

javascript - storing input from prompt in array and displaying the array -