penetration testing - wireshark i want to sniff on local ip -


i have testing environment set @ home 2 pc´s.

pc 1 ip = 192.168.1.2

pc 2 ip = 192.168.1.4

gateway = 192.168.1.1

i sitting on pc 1.

both computers on internet. tried stuff like, going on google , searching, logging in on gmail, using youtube , other things aka. same.

i want sniff http traffic being send 192.168.1.4, many tries dident succed.

i tried apply filter: ip.src == ...1.2 && ip.dst == ...1.4

i tried use pc 2 wlan card , sniff on mac address, no luck.

all ever got weird traffic, no http traffic.

how win this?

you need perform kind of man-in-the-middle attack in order retrieve traffic target computer, unless sitting on router/switch/gateway. can achieved arp spoofing victim, , forwarding victim traffic through own machine , router. ettercap tool looking for: ettercap website. can run on windows , linux if on linux try:

# ettercap -tq -m arp /pc2// /gateway//

you should able see pc2 traffic in wireshark. have http aware, https require decryption of session.

hope helps.


Comments

Popular posts from this blog

How to remove text and logo OR add Overflow on Android ActionBar using AppCompat on API 8? -

html - How to style widget with post count different than without post count -

url rewriting - How to redirect a http POST with urlrewritefilter -