Jump to content
begood

Remote Sniffing using the Meterpreter Sniffer Module

Recommended Posts

Once a remote host is compromised, the attacker might want to break into more computers on the target network, using the compromised host as a staging point. One of the first steps the attacker would then take, would be to do information gathering about the target network. Packet sniffing is a good way to begin information gathering on a LAN, and this can reveal a lot of interesting information.

In this video, Raul Siles shows a demo of how to do remote packet sniffing using the built in sniffer module in the Meterpreter. Once he has sniffed the packets, he imports the pcap file to his local machine and views them using Tcpdump.

Thanks go out to Raul Siles for creating this video!

Remote Sniffing using the Meterpreter Sniffer Module Tutorial

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...