From the course: Offensive Penetration Testing

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Wireshark and Encrypted Traffic

Wireshark and Encrypted Traffic

Wireshark and Encrypted Traffic. We only have one learning objective here, and that's to understand the difference between encrypted traffic and unencrypted traffic when using Wireshark or while using Wireshark. So why is this important? Well, as an attacker, we want to know, again, what our tools do. And if I'm using Netcat in a Pentest and I am exfiltrating data, I'm doing everything in the clear. A defender can see exactly what data I'm exfiltrating, which, of course, is bad. So it's important to know what our tools do. And a tool that's like Netcat is Socat. So in the new PWK material that came out last year, they are now introducing the Socat. Socat has been out longer of course than that But the tool is like Netcat, is a bit more versatile and it's a little bit harder to learn how to use. Now, we can see here I'm creating a reverse shell on Port 22 from my Windows box, connecting to my Kali box. And here's the syntax. Again, not as easy to learn as Netcat. So if we look at our…

Contents