

During the installation, if you're asked if non-superusers be able to capture packets.

If you say: NO > youre good to go, but you gonna need root privileges to run it. sudo add-apt-repository ppa:wireshark-dev/stable sudo apt-get update sudo apt-get install wireshark. sudo apt install wireshark It will install wireshark ( in my case v2.6.8 ) and you will be asked to add dumpcap in wireshark user group so you dont need to be root to execute it. And you have just located the password and username you have entered on the unprotected login page - whether or not the password and username are correct are irrelevant. Once all the dependencies have been installed, we run the following in the terminal. Once you get there look in the red text paragraphs and try to find what I was able to locate in the picture. Here’s how Wireshark looks when you load it. Wireshark has an awesome GUI, unlike most penetration testing tools. Then you will right click on it and go down to "FOLLOW" then to "TCP STREAM". Download and install Wireshark from here. You can see exactly what I am talking about if you follow the pictures above. Then at the far right of the packet in the info section you will see something like ".login" or "/login". This drastically narrows the search and helps to slow down the traffic by minimizing what pops up on the screen.

By filtering this you are now only looking at the post packet for HTTP. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Wireshark comes with the option to filter packets. The application Wireshark download is a free, open-source packet analyzer. HTTP (Hyper Text Transfer Protocol) is the protocol we will be dealing with when looking for passwords. The second step to finding the packets that contain login information is to understand the protocol to look for.
