Information Technology | Question and Answer
Analyzing the use of packet analysis/sniffing as an active or passive technique, the need for 'sudo' command when executing Wireshark, retrieving username and password from HTTP packet, the availability of credentials in a HTTP POST packet, assessing the security of a login page based on captured traffic, and suggesting improvements for page security.
Added on 2022-09-09
Information Technology | Question and Answer
Analyzing the use of packet analysis/sniffing as an active or passive technique, the need for 'sudo' command when executing Wireshark, retrieving username and password from HTTP packet, the availability of credentials in a HTTP POST packet, assessing the security of a login page based on captured traffic, and suggesting improvements for page security.
Added on 2022-09-09
End of preview
Want to access all the pages? Upload your documents or become a member.