DSniff

Description

dsniff is a collection of tools for network auditing and penetration testing, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.).

This popular and well-engineered suite by Dug Song includes many tools:  filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.); arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching); and sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected ssh and https sessions by exploiting weak bindings in ad-hoc PKI.

The tool is a member of the D sniff suit toolset , it’s an advanced password sniffer that recognizes several different protocols, including TELNET, FTP, SMTP, Post Office Protocol (POP), Internet Message Access Protocol (IMAP), HTTP, CVS, Citrix, Server Message Block (SMB), Oracle, and many others. Whereas other sniffers such as Wireshark will give you tons of additional information about the connection and the individual packets , you use dsniff if all you want are usernames and passwords.

Dsniff, as the name implies, is a network sniffer – but designed for testing of a different sort, dsniff is a package of utilities that includes code to parse many different application protocols and extract interesting information, such as usernames and passwords, web pages being visited, contents of email, and more. Additionally, it can be used to defeat the normal behaviour of switched networks and cause network traffic from other hosts on the same network segment to be visible, not just traffic involving the host dsniff is running on.

Usage

Syntax

dsniff [-cdmn] [-i interface | -p pcapfile] [-s snaplen]  [-f services] [-t trigger[,…]] [-r|-w savefile] [expression]

Example

cyborg@cyborg:~$ sudo dsniff -i eth0 -w io
dsniff: listening on eth0

Now,View resulting file 'io'
cyborg@cyborg:~$ sudo cat io
b1        �
                   ��G�� �
                                   ��G�� 
0 Comments

Leave a reply

CONTACT US

We're are building as a community and a team. Be a part of it.

Sending

©2017 Ztrela Knowledge Solutions Pvt. Ltd

Log in with your credentials

Forgot your details?