INE Training Notes - by syselement
🏠 Home BlogGitHub📚 Buy Me a Book
  • INE Training Notes
  • Courses
    • eJPT - PTSv2
      • 📒Penetration Testing Prerequisites
        • Introduction
        • Networking
        • Web Applications
      • 📒1. Assessment Methodologies & Auditing
        • Information Gathering
        • Footprinting & Scanning
        • Enumeration
          • 🔬SMB Enum
          • 🔬FTP Enum
          • 🔬SSH Enum
          • 🔬HTTP Enum
          • 🔬MYSQL Enum
          • 🔬SMTP Enum
        • Vulnerability Assessment
        • Auditing Fundamentals
      • 📒2. Host & Network Penetration Testing
        • System/Host Based Attacks
          • 🪟Windows Attacks
            • 🔬IIS - WebDAV
            • 🔬SMB - PsExec
            • 🔬RDP
            • 🔬WinRM
            • 🔬Win Kernel Privesc
            • 🔬UAC Bypass
            • 🔬Access Token
            • 🔬Alternate Data Stream
            • 🔬Credentials Dumping
          • 🐧Linux Attacks
            • 🔬Bash
            • 🔬FTP
            • 🔬SSH
            • 🔬SAMBA
            • 🔬Cron Jobs
            • 🔬SUID
            • 🔬Hashes Dumping
        • Network Based Attacks
          • 🔬Tshark, ARP, WiFi
        • The Metasploit Framework (MSF)
          • 🔬HFS - MSF Exploit
          • 🔬Tomcat - MSF Exploit
          • 🔬FTP - MSF Exploit
          • 🔬Samba - MSF Exploit
          • 🔬SSH - MSF Exploit
          • 🔬SMTP - MSF Exploit
          • 🔬Meterpreter - MSF
          • 🔬Win Post Exploitation - MSF
          • 🔬Linux Post Exploitation - MSF
        • Exploitation
          • 🔬Fixing Exploits - HFS
          • 🔬Win Workflow Platform - MSF
          • 🔬Win Black Box Pentest
          • 🔬Linux Black Box Pentest
        • Post-Exploitation
          • 🔬Windows Post-Exploitation
          • 🔬Windows Privilege Escalation
          • 🔬Windows Persistence
          • 🔬Linux Post-Exploitation
          • 🔬Linux Privilege Escalation
          • 🔬Linux Persistence
          • 🔬Cracking Hashes
          • 🔬Pivoting
        • Social Engineering
      • 📒3. Web Application Penetration Testing
        • Intro to Web App Pentesting
          • 🔬HTTP Enumeration
          • 🔬Web App Scanning
          • 🔬Web App Attacks
      • 🔬Exam Preparation - Labs
        • PTSv1 Prerequisites Labs
          • 🔬HTTP(S) Traffic Sniffing
          • 🔬Find the Secret Server
          • 🔬Data Exfiltration
          • 🔬Burp Suite Basics - Directory Enumeration
        • PTSv2 Practice Labs
      • 🌐eJPT References
      • 📜eJPT Cheat Sheet
    • ICCA
      • 📒1. Cloud Foundations
      • 📒2. Cloud Management Concepts
      • 📒3. Cloud Identity, Security, and Compliance
      • 🌐Icca References
    • eMAPT
      • 📒Android
      • 📒iOS
      • 🌐eMAPT References
  • 🏠syselement's Blog Home
Powered by GitBook
On this page

Was this helpful?

Edit on GitHub
  1. Courses
  2. eJPT - PTSv2
  3. 🔬Exam Preparation - Labs
  4. PTSv1 Prerequisites Labs

🔬HTTP(S) Traffic Sniffing

PreviousPTSv1 Prerequisites LabsNext🔬Find the Secret Server

Last updated 1 year ago

Was this helpful?

  1. Connect to the Lab VPN (INE in this case) by using OpenVpn and the .ovpn file provided. (in my case INE provided a direct Lab Link / Kali GUI instance opened in another tab).

    • From terminal, check if the machines are reachable:

      ping demo.ine.local

      ping demossl.ine.local

    • Check open ports with nmap tool:

      nmap demo.ine.local

      nmap demossl.ine.local

    • Check the Kali Machine interface name:

      ifconfig

  1. Open Wireshark and start the capture on the Vpn network interface.

    • or use the terminal:

wireshark -i eth1
  1. Generate traffic from the browser by browsing to the HTTP web page (http://demo.ine.local) and try a login.

  2. The sniffer records the traffic between the browser and the server. Right click on a packet and Follow TCP Stream to see the traffic exchange.

    • In case of HTTP protocol, the clear-text traffic can be sniffed easily. The content of the packets is in human readable form.

  1. Restart the capture to clean the results. Try the same login into the HTTPS web page (https://demossl.ine.local) and check the TCP Stream in the captured traffic.

    • Check the certificate with the lock icon.

    • In case of HTTPS protocol, the traffic is encrypted, unreadable and protected.

    • HTTPS (HTTP over TLS) protects the content

  1. Captured traffic can be filtered in Wireshark with display filters.

📍 Lab solved!