More Easily Reconstruct a Transmitted File

NetworkMiner Logo on a blue background

Previously I have posted a tutorial on how data can be easily reconstructed from a packet capture using Wireshark if the site is using an unsecured connection. This method involves manually reconstructing the desired files by looking for the appropriate signature. Manually looking for the desired file within a packet capture is a time intensive…

Cracking WEP Encryption

WEP Decryption Header

Recently I was tasked with cracking the WEP Encryption of a sample capture generated using Wireshark. With a sample capture provided this didn’t take long and thought I’d do a quick tutorial on how I did it. NOTE: A warning is usually appended to any article concerning the capture of packets on a network and…

Reconstructing a Transmitted File

Finding a JPEG Signature within Hex Fiend

Previously I’ve blogged about taking initial steps using Wireshark to inspect data within a network to see what data might be leaking on a network. If there does happen to be unencrypted information being transmitted on a network you may want to see exactly what that data is in order to know how important the…

Diving into Wireshark

Wireshark Header Image

Public wifi networks are now so prevalent that they have become relied upon by people for a high percentage of their data usage. With the amount of data now consumed on peoples mobiles and the sometimes stingy data packages offered by carriers; public wifi is sometimes used as a the main internet connection on a…