From the course: Wireshark: Network Troubleshooting

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Solution: Viewing unencrypted traffic

Solution: Viewing unencrypted traffic - Wireshark Tutorial

From the course: Wireshark: Network Troubleshooting

Start my 1-month free trial

Solution: Viewing unencrypted traffic

(bright music) - [Instructor] Okay, how did you do? Let's walk through this challenge together. First, we'll start a capture. I'll select an interface and hit the bluefin to begin the capture. Next, I'll go to the FTP site. Now once I'm here, as you know, you could use FTP in an application or in a browser. In this case, we see that the connection is not secure. That should be your first indication that data might be compromised. Now we're going to open the file copying policy. I'll say open with and I'll simply select Wordpad, and then I'll stop the capture. Once it's done, I'll look for that copying policy. I'll go to FTP, and as you can see, we have a number of responses here. Now I have this one and you can see the response and my name, user name, and I'm going to to follow the TCP stream, and once you're in here, it's just an anonymous entry, and you can see that I asked to retrieve copying policy. Now…

Contents