![]() ![]() This is a product of the (in) famous libpcap library that you would possibly get on any Unix or Linux machine. I will name a few in the course of this post, and I will leave the rest as an exercise for you. I do not want to get deeper into this muck, but I am stating this here so as to make you aware (if you are not already aware) that there are tools far better than the ones listed below. ![]() Popularity depends on the size of the community that supports the tool, and there are vested interests of commercial organizations that create these communities. ![]() Please note that popularity doesn't mean they are the best. The following are some of the more popular tools used in the domain of packet sniffing. They may have modified them to a certain extent and made them proprietary, but they are available within the Microsoft suits. I think that nowadays Windows has all the tools that are available as open source code in the internet. ![]() I will primarily be using a Linux distro, (specifically Ubuntu 14.04), but you can definitely stretch this for other Linux and UNIX distros, and possibly Microsoft Windows and Mac too. Later, we will see how we can use them from within python code. I will just introduce you to what can be done using python in the context of network intelligence gathering.Įnough talk, let us now talk about the tools available for the “trade”. It can be used for benign purposes, but it can also be used for “not so benign” purposes. Naturally, by now, I hope you understand that the “harvesting information” part of the title is just there to sanitize this blog post, so that people cannot say I am putting up evil ideas using the noble python language. Well, as the title suggests, we are going to look into how to harvest information, using various methods like writing scrapers for specific websites which display the email addresses of their clients (of course behind an authentication mechanism) and sniffing your network to find out the email addresses (and maybe, bank and credit card details) of users logged into the network and naive enough to do financial transactions over such a network which can be compromised, and checking emails. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |