All Rooms

Protocols and Servers 2

medium1h 30mtryhackme

The follow-up to Protocols and Servers — now you attack what you built in the first room. Covers packet sniffing (tcpdump, Wireshark), man-in- the-middle attacks (Ettercap, Bettercap), TLS as the defense, SSH for encrypted remote access including scp file transfers, and offline password cracking with Hydra to brute-force IMAP credentials.

Skills You Will Learn

sniffingmitmtlssshpassword-attackshydra

Prerequisites

Walkthrough Phases

1

Sniffing Attacks — tcpdump and Wireshark

Capture and filter network traffic to see cleartext credentials

2

Man-in-the-Middle — Ettercap and Bettercap

Understand MITM tools and their interface options

3

TLS — Encrypting Protocols

Understand TLS as the defense against sniffing and MITM

4

SSH — Secure Shell

Use SSH for remote access and scp for secure file transfer

5

Password Cracking — Hydra against IMAP

Brute-force lazie's IMAP password using Hydra

10 questions to answer

alienrecon start thm-protocolsandservers2

Don't have AlienRecon? Get started here