All Rooms
Protocols and Servers 2
medium1h 30mtryhackme
The follow-up to Protocols and Servers — now you attack what you built in the first room. Covers packet sniffing (tcpdump, Wireshark), man-in- the-middle attacks (Ettercap, Bettercap), TLS as the defense, SSH for encrypted remote access including scp file transfers, and offline password cracking with Hydra to brute-force IMAP credentials.
Skills You Will Learn
sniffingmitmtlssshpassword-attackshydra
Prerequisites
- thm-protocolsandservers
- network-protocols
- telnet
- ftp
- smtp
- pop3
Walkthrough Phases
1
Sniffing Attacks — tcpdump and Wireshark
Capture and filter network traffic to see cleartext credentials
2
Man-in-the-Middle — Ettercap and Bettercap
Understand MITM tools and their interface options
3
TLS — Encrypting Protocols
Understand TLS as the defense against sniffing and MITM
4
SSH — Secure Shell
Use SSH for remote access and scp for secure file transfer
5
Password Cracking — Hydra against IMAP
Brute-force lazie's IMAP password using Hydra
10 questions to answer
alienrecon start thm-protocolsandservers2Don't have AlienRecon? Get started here