Sniffing & Spoofing: Revision history

Jump to navigation Jump to search

Diff selection: Mark the radio buttons of the revisions to compare and hit enter or the button at the bottom.
Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.

17 May 2025

  • curprev 17:5017:50, 17 May 2025 Vegard talk contribs 2,656 bytes +19 No edit summary
  • curprev 17:4817:48, 17 May 2025 Vegard talk contribs 2,637 bytes +15 No edit summary
  • curprev 17:4717:47, 17 May 2025 Vegard talk contribs 2,622 bytes +110 No edit summary
  • curprev 17:4517:45, 17 May 2025 Vegard talk contribs 2,512 bytes +2,512 Created page with "== Sniffing & Spoofing == Sniffing inspects network traffic in real-time, extracting headers, payloads, and session metadata. It uncovers credentials, tokens, and protocol weaknesses, and establishes situational awareness before or during exploitation. === Common Techniques === Capturing raw packets with promiscuous or monitor mode interfaces Filtering traffic by IP, port, or protocol to isolate valuable data Reassembling TCP streams to read clear-text credentials Fol..."