This article is for technical discussion only and cannot be used for illegal purposes.
Step 1: Install the Wireshark and turn on the NIC promiscuous mode to grab the packet. Do not understand the classmate asked degrees Niang, it is not discussed in this article.
Step 2: Background
East Brother Reimbursement System account and password is automatic landing, a long time password do not remember, today we pass Wireshark to retrieve the password.
650) this.width=650; "title=" qq20150302113431.jpg "alt=" wkiol1tz3i7dihn0aaqwjtp5ixy588.jpg "src="/HTTP/ S3.51cto.com/wyfs02/m01/5a/02/wkiol1tz3i7dihn0aaqwjtp5ixy588.jpg "/>
Step 3: Filter the packet, the command is as follows
http.request.method== "POST"
650) this.width=650; "title=" 15.jpg "alt=" wkiom1tz3a2aq51eaac3tiq1kbs541.jpg "src=" http://s3.51cto.com/wyfs02/M00/ 5a/05/wkiom1tz3a2aq51eaac3tiq1kbs541.jpg "/>
Step 4: Next, click on the Post event line, then right-click to select "Follow TCP Stream"
650) this.width=650; "title=" qq20150302114556.jpg "alt=" wkiol1tz3jlt7bgfaaxwtcxhqem618.jpg "src="/HTTP/ S3.51cto.com/wyfs02/m00/5a/02/wkiol1tz3jlt7bgfaaxwtcxhqem618.jpg "/>
Step 5: We analyze the contents of the message and find the password vividly.
650) this.width=650; "title=" 123.jpg "alt=" wkiol1tz3xgcfndiaaxcavbwlim627.jpg "src=" http://s3.51cto.com/wyfs02/M02 /5a/02/wkiol1tz3xgcfndiaaxcavbwlim627.jpg "/>
Conclusion: At present, a lot of large websites MD5 encryption of passwords, so even if hackers sniff the data, it is not very useful, but do not rule out that you use 123456 weak password. (The MD5 value of the weak password is basically no different from the plaintext). Therefore, improve network security awareness, the use of complex passwords. The Crown texted is the precedent, you understand!
We is not Anonymous
We are Legion
We do not forget
We do not forgive
Expect US
This article is from the "Wendong" blog, please be sure to keep this source http://hackerwang.blog.51cto.com/734458/1616425
Use Wireshark sniffer website Login password