Solved

Data Capturing

Posted on 2014-04-18
8
569 Views
Last Modified: 2014-05-03
Hi Experts,
I would be able to capture data as chatting messages and passwords come through my TP-Link router.

Appreciate for any help
0
Comment
Question by:lexmark1
  • 2
  • 2
  • 2
  • +2
8 Comments
 
LVL 25

Assisted Solution

by:Zephyr ICT
Zephyr ICT earned 167 total points
ID: 40008517
Wireshark is the go-to tool for capturing packets, either on LAN or WAN, it won't give you the passwords or chat messages in a clear to see way but you can use filters to optimize it, more info to use Wireshark on WiFi: http://wiki.wireshark.org/CaptureSetup/WLAN

There's also loads of videos and howto's out there on using Wireshark to capture traffic.

Let me know if you need more info.
0
 
LVL 24

Assisted Solution

by:Mohammed Khawaja
Mohammed Khawaja earned 166 total points
ID: 40008577
Most sites that require authentication utilizes SSL and same for chats.  You will not be able to see them in plain-text as they will be encrypted.
0
 
LVL 14

Expert Comment

by:Giovanni Heward
ID: 40008696
If your IM client requires SSL/TLS, try using an SSL MiTM proxy, such as Burp Suite, Fiddler, or Charles.  Succeeding may depend on whether or not the IM client will inherently trust untrusted certs, or is configurable to do so.

Depending on the IM client, different approaches may be required-- for example Lync.
0
 
LVL 35

Accepted Solution

by:
Kimputer earned 167 total points
ID: 40008730
Also, you're probably missing the hardware requirements to capture the actual packets (unless you got a hold of a fancy custom firmware). You need an old hub or managed switch with port mirroring on any end where ALL data packets come together, and connect your laptop with Wireshark before you can even start decoding the packets.

Situation 1:
It's a modem router, there's no WAN port (but directly to the phone line/ADSL). You can't capture Wifi! You need an extra switch besides the old hub or managed switch that I mentioned before. Connect all LAN cables to this switch, then a cable to the old hub or managed switch. Then a cable to the TPLink. Your laptop will be connected to the hub/managed switch
Situation 2:
It's a "normal" router with wifi. Connect WAN from TPLink to your hub/mananged switch, from there connect to the original location (probably modem). Connect laptop to hub/managed switch.
0
VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

 

Author Comment

by:lexmark1
ID: 40010075
Thanks for all participators,
In deed I used a Cisco switch and connect my laptop to the mirror port also I used Wfilter software to track users I can see websites and web mail but not whatsapp and viber chatting also I am unable to see passwords.

Thanks
0
 
LVL 35

Expert Comment

by:Kimputer
ID: 40010763
Ok good to know. But those are indeed secured traffic. I'm not even sure is it's basic SSL/TSL, or if there's an extra own encryption layer above it (like Skype used to have). As stated above, if you try any man in the middle attack, you risk breaking the client (and if not, probably a big warning sign which might frighten the user into continuing his session).
And if an extra encryption layer is used, you might need months if not years to crack it.
0
 
LVL 24

Expert Comment

by:Mohammed Khawaja
ID: 40010903
My question is what are you trying to achieve?
0
 

Author Comment

by:lexmark1
ID: 40014434
I want to be able to capture any chatting messages and any password in plain text.

Thanks
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now