Sponsored by: █ Sparkhost - Hosting Without Compromises! █ Hybrid Performance Web Hosting █ Spark Host Stream Hosting █ Hybrid IRC & IRCd Server Shell Accounts
How To Sniff Vpn ?
Posted 13 January 2004 - 12:01 AM
what program to uses to sniff
every one can tell me
Posted 13 January 2004 - 10:38 AM
Are you ON a vpn yourself, and want to sniff the traffic, or are you wanting to sniff someone else's VPN? If you want to sniff someone else's VPN, are you on the same subnet as them...or what?
Ethereal is what most people use for heavy duty sniffing, although there are others.
Posted 13 January 2004 - 10:48 AM
Would you like to earn money posting on GSO?
Posted 14 January 2004 - 12:56 AM
When i'm uses VPN in same subnet
i want to test Sniff data All user ?
Posted 14 January 2004 - 05:15 AM
1) decrypt traffic off the line - have fun will take a lot of time
to even decode one single packet (break ipsec encryption ??)
2) catch the traffic before/after it passes the tunnel
usually possible on your workstation or at the remote end
Posted 15 January 2004 - 06:02 AM
If you have acces to either the start or the end point your not in between
traffic anymore like as if you where sniffing regular unencrypted connections.
Furthermore, VPN isnt just VPN, there are many types and flavours and configurations, things that come to mind are; Certificate Authorities (Root, Subordinate, offline, online, standalone, enterprise and 3 tier configs), Hardware or Software based VPN, IPSEC, SmartCard, EAP, PKI, L2TP, PPTP, and multiple other factors which will either make it possible or not for you to sniff/decrypt
packets that are exchanged over the VPN.
Posted 24 November 2004 - 12:25 AM
and also.. i use firefox as my browser and i was wondering what is the best way to do
PC > VPN > proxy chain > web ?? getanonymous isnt capatible with firefox yet, so what can i do ?
Posted 26 November 2004 - 03:45 AM
Posted 26 November 2004 - 10:24 AM
I don't know that ettercap can sniff VPN. But procedure should just like SSH.
setthesun me = new setthesun();
Posted 27 November 2004 - 02:36 AM
it`s not even littele hard to niff IPSec !
the only thing you need is the key ,
after that , a simple buf powerfull sniffer like tcpdump can capture data back to it`s
decrypted format .
so try to capture/steal the key first , then you`ve done 90% of the mission .
it was for IPsec ,
in case of tricking VPN clients/servers there is also some ways to break the channle
some public and documented and some still a big " ? "
here is one of those documented methods for special VPN solution :
PPTP insecurityes , by Mudge from L0pht group ,
Posted 06 January 2005 - 02:45 AM
I mean steal the keys of the source and destination and proxy it thro' ur machine
Posted 06 November 2011 - 06:57 PM
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users