Penetration Testing mailing list archives

Re: analysing captured packets


From: "Don Parker" <dparker () bridonsecurity com>
Date: Fri, 31 Mar 2006 20:29:51 -0500

Hi Robin,

I would suggest you navigate to the articles section of my website. There are several articles there that I have written for Securityfocus, WindowSecurity amongst other sites that covers
what you are looking for.

Cheers,

Don

----- Original Message ----- From: "Robin Wood" <dninja () gmail com>
To: <pen-test () securityfocus com>
Sent: Friday, March 31, 2006 5:01 PM
Subject: analysing captured packets


Hi
Can anyone give any pointers to good tutorials on how to go about
analysing network traffic captured during a pen-test.

I'm currently using ethereal but I'm not necessarily looking for an
ethereal tutorial more a howto on what to look for in capture files.
Things like good protocols to spot (e.g. ftp logs in in plaintext so
you can grab login details), how to recognise what is going on by
watching the high level handshakes (e.g. a http get is usually
followed by a response containing html), things like that.

Thanks

Robin

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to proactively
protect your applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a managed
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com
------------------------------------------------------------------------------





------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com
------------------------------------------------------------------------------


Current thread: