Question: 2) Using your own Wireshark tool, perform the following exercises. Start your Wireshark and then open the web browser and navigate to this website: testfire.net
2) Using your own Wireshark tool, perform the following exercises. Start your Wireshark and then open the web browser and navigate to this website: testfire.net and try to pick out the login credentials, using guest and guest as the username and password. Stop your capture and locate these credentials in the trace information. What filter did you use: __________________________ Actual Packets Captured and Displayed: Captured:____________ Displayed:_________________
3) Conduct MiTM attack using all three virtual machine Windows XP, Metaslpoitable2 and Kali to run the tools Ettercap and driftnet to capture the images being sent/received. Describe what protocols are being used to accomplish this attack and are there any ways to prevented?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
