

When the authentication process was complete and I was logged in, I went back and stopped the capture in Wireshark. I opened a browser and signed in a website using my username and password. Step 2: Filter captured traffic for POST dataĪt this point, Wireshark is listening to all network traffic and capturing them. In case you missed this, you can always capture traffic by going back to Capture > Interface > Start Ideally, you could just press Start button here and Wireshark will start capturing traffic. In my case, I am using a Wireless USB card, so I’ve selected wlan0. In Wireshark go to Capture > Interface and tick the interface that applies to you. In Kali Linux, you can start Wireshark by going toĪpplication > Kali Linux > Top 10 Security Tools > Wireshark

Step 1: Start Wireshark and capture traffic Network Card (Wi-Fi Card, LAN Card, etc) fyi : for wi-fi it should support promiscuous mode Let’s Start To Sniff Password Using WiresharkĪlso Read: How To Unlock Android Pattern Lock Or Password Lock We do not accept responsibility for anyone who thinks it’s a good idea to try to use this to attempt to hack systems that do not belong to youġ. To check if promiscuous mode is enabled, click Capture > Options and verify the “Enable promiscuous mode on all interfaces” checkbox is activated at the bottom of this window.Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU.


If you have promiscuous mode enabled-it’s enabled by default-you’ll also see all the other packets on the network instead of only packets addressed to your network adapter. Wireshark captures each packet sent to or from your system. You can configure advanced features by clicking Capture > Options, but this isn’t necessary for now.Īs soon as you click the interface’s name, you’ll see the packets start to appear in real time. For example, if you want to capture traffic on your wireless network, click your wireless interface. Or, go to the Wireshark toolbar and select the red Stop button thats located next to the shark fin. Select File > Save As or choose an Export option to record the capture. Click on Next and then Finish to dismiss that dialogue window. Select the shark fin on the left side of the Wireshark toolbar, press Ctrl+E, or double-click the network. by using 'Follow TCP stream' from the popup menu on a FTP connection: Follow TCP Stream Menu Option. Capturing PacketsĪfter downloading and installing Wireshark, you can launch it and double-click the name of a network interface under Capture to start capturing packets on that interface. In the first case, things are simple - load the captured packets into Wireshark and look through all packets to find passwords, e.g. Don’t use this tool at work unless you have permission. Just a quick warning: Many organizations don’t allow Wireshark and similar tools on their networks.
