Using Wireshark to Detect an Encrypted SQL Server 2000 connection

Posted on 2010-09-02
Last Modified: 2013-12-01
Is it possible to verify if a SQL Server is using an Encrypted connection with Wireshark?

If so, how?

I can see the actual sql statement with Wireshark but I can not see if the SQL connection is encrypted.

Question by:FastEddie___
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 22

Accepted Solution

Matt V earned 500 total points
ID: 33588737
If you can see the SQL statements then the connection is not encrypted.

Expert Comment

ID: 33588742
can you post the wireshark output?

Author Comment

ID: 33590020
I have attached the wireshark .pcap file and an image that shows the query being run.
Please let me know what you think.

The Ultimate Checklist to Optimize Your Website

Websites are getting bigger and complicated by the day. Video, images, custom fonts are all great for showcasing your product/service. But the price to pay in terms of reduced page load times and ultimately, decreased sales, can lead to some difficult decisions about what to cut.

LVL 22

Expert Comment

by:Matt V
ID: 33590892
As I said, if you can see the plain text then the stream is not encrypted.

Author Closing Comment

ID: 33590921
Thank you.

LVL 33

Expert Comment

by:Dave Howe
ID: 33594423
encrypted sql is over tls - so if it starts with a https-style handshake, it is working :)

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Ransomware is a growing menace to anyone using a computer or mobile device. Here are answers to some common questions about this vicious new form of malware.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question