[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Data Capturing

Posted on 2014-04-18
8
Medium Priority
?
605 Views
Last Modified: 2014-05-03
Hi Experts,
I would be able to capture data as chatting messages and passwords come through my TP-Link router.

Appreciate for any help
0
Comment
Question by:lexmark1
  • 2
  • 2
  • 2
  • +2
8 Comments
 
LVL 25

Assisted Solution

by:Zephyr ICT
Zephyr ICT earned 501 total points
ID: 40008517
Wireshark is the go-to tool for capturing packets, either on LAN or WAN, it won't give you the passwords or chat messages in a clear to see way but you can use filters to optimize it, more info to use Wireshark on WiFi: http://wiki.wireshark.org/CaptureSetup/WLAN

There's also loads of videos and howto's out there on using Wireshark to capture traffic.

Let me know if you need more info.
0
 
LVL 25

Assisted Solution

by:Mohammed Khawaja
Mohammed Khawaja earned 498 total points
ID: 40008577
Most sites that require authentication utilizes SSL and same for chats.  You will not be able to see them in plain-text as they will be encrypted.
0
 
LVL 15

Expert Comment

by:Giovanni Heward
ID: 40008696
If your IM client requires SSL/TLS, try using an SSL MiTM proxy, such as Burp Suite, Fiddler, or Charles.  Succeeding may depend on whether or not the IM client will inherently trust untrusted certs, or is configurable to do so.

Depending on the IM client, different approaches may be required-- for example Lync.
0
IT Degree with Certifications Included

Aspire to become a network administrator, network security analyst, or computer and information systems manager? Make the most of your experience as an IT professional by earning your B.S. in Network Operations and Security.

 
LVL 37

Accepted Solution

by:
Kimputer earned 501 total points
ID: 40008730
Also, you're probably missing the hardware requirements to capture the actual packets (unless you got a hold of a fancy custom firmware). You need an old hub or managed switch with port mirroring on any end where ALL data packets come together, and connect your laptop with Wireshark before you can even start decoding the packets.

Situation 1:
It's a modem router, there's no WAN port (but directly to the phone line/ADSL). You can't capture Wifi! You need an extra switch besides the old hub or managed switch that I mentioned before. Connect all LAN cables to this switch, then a cable to the old hub or managed switch. Then a cable to the TPLink. Your laptop will be connected to the hub/managed switch
Situation 2:
It's a "normal" router with wifi. Connect WAN from TPLink to your hub/mananged switch, from there connect to the original location (probably modem). Connect laptop to hub/managed switch.
0
 

Author Comment

by:lexmark1
ID: 40010075
Thanks for all participators,
In deed I used a Cisco switch and connect my laptop to the mirror port also I used Wfilter software to track users I can see websites and web mail but not whatsapp and viber chatting also I am unable to see passwords.

Thanks
0
 
LVL 37

Expert Comment

by:Kimputer
ID: 40010763
Ok good to know. But those are indeed secured traffic. I'm not even sure is it's basic SSL/TSL, or if there's an extra own encryption layer above it (like Skype used to have). As stated above, if you try any man in the middle attack, you risk breaking the client (and if not, probably a big warning sign which might frighten the user into continuing his session).
And if an extra encryption layer is used, you might need months if not years to crack it.
0
 
LVL 25

Expert Comment

by:Mohammed Khawaja
ID: 40010903
My question is what are you trying to achieve?
0
 

Author Comment

by:lexmark1
ID: 40014434
I want to be able to capture any chatting messages and any password in plain text.

Thanks
0

Featured Post

Get Cisco Certified in IT Security

There’s a high demand for IT security experts and network administrators who can safeguard the data that individuals, corporations, and governments rely on every day. Pursue your B.S. in Network Operations and Security and gain the credentials you need for this high-growth field.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
In this article, the configuration steps in Zabbix to monitor devices via SNMP will be discussed with some real examples on Cisco Router/Switch, Catalyst Switch, NAS Synology device.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Suggested Courses
Course of the Month20 days, 6 hours left to enroll

872 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question