Sniff-n-Spit v1.0 - intercepting communications
During Penetration testing it can be seen that thick-clients sometimes communicate with a server whose IP address is hardcoded in to it.The HTTP communication between such client and server is harder to intercept and test. Sniff-n-Snip is a very useful utility in such scenarios. It sniffs for HTTP packets from the client to server and forwards them to your favorite proxy (Burp, WebScarab, Paros etc).
User Input:
The tool expects the following user input:
- Number of the listening interface. This number can be found using the "-l" switch.
- Source IP, Source Port (optional), Destination IP, and Destination Port of the tcp session that is to be sniffed
- Target IP and Target Port of the Interceptor Proxy. Typically values will be 127.0.0.1, 8080.
- The tool can be forced to listen on promiscuous mode with the "-p" switch. This is OFF by default.
Requirements:
- WinPcap should be installed on the system, the tool requires this library for sniffing packets.
Read the User Guide
More information: here
Thank you to Lavakumar Kuppan, from AnD Labs to sharing this tool with us.
Post scriptum
Comments
Related Articles
Connectivity |
|
Data Sniffer |
|
Sniff-n-Spit |
|