<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: wireshark - packet sniffing in Security e-Series</title>
    <link>https://community.hpe.com/t5/security-e-series/wireshark-packet-sniffing/m-p/5922087#M188</link>
    <description>&lt;P&gt;Piotr,&lt;/P&gt;&lt;P&gt;It's all about filters with Wireshark.&amp;nbsp; You can run the capture with filters or use filters after the capture is complete to see exactly what you want.&amp;nbsp; Filter by IP or by protocol.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Check here for Display Filter Reference:&amp;nbsp; &lt;A href="http://www.wireshark.org/docs/dfref/" target="_blank"&gt;http://www.wireshark.org/docs/dfref/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Check here forHow To Set Up a Capture:&amp;nbsp; &lt;A href="http://wiki.wireshark.org/CaptureSetup" target="_blank"&gt;http://wiki.wireshark.org/CaptureSetup&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Wireshark book to use and have for ref is: &lt;A href="http://www.chappellu.com/wiresharkbook.html" target="_blank"&gt;http://www.chappellu.com/wiresharkbook.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;and of course...Laura Chappels blog: &lt;A href="http://laurachappell.blogspot.com/" target="_blank"&gt;http://laurachappell.blogspot.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other than that, you may sign up for courses at WiresharkU that are very good.&amp;nbsp; You can even get an all-access pass that is moderately priced that will allow you to see and attend all online courses for one year.&lt;/P&gt;&lt;P&gt;Good luck and hope this helps!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 04 Jan 2013 15:43:39 GMT</pubDate>
    <dc:creator>bspencer63</dc:creator>
    <dc:date>2013-01-04T15:43:39Z</dc:date>
    <item>
      <title>wireshark - packet sniffing</title>
      <link>https://community.hpe.com/t5/security-e-series/wireshark-packet-sniffing/m-p/4330830#M184</link>
      <description>&lt;P&gt;Hi there&lt;BR /&gt;&lt;BR /&gt;I'm using Wireshark to capture packets in my network. As it's capturing I'm sending some chat messages using Skype.&lt;BR /&gt;Then I'm trying to read those strings from Wireshark: File &amp;gt; Find Packet &amp;gt; String &lt;BR /&gt;&lt;BR /&gt;I can't find any of those strings I was sending via Skype.&lt;BR /&gt;&lt;BR /&gt;Does anyone know why ?&lt;BR /&gt;&lt;BR /&gt;Can I somehow set a trap for Skype messages only ?&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;&lt;BR /&gt;Peter&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;P.S.This thread has been moved from Insight Remote Support&amp;gt;Security to Security &amp;gt; HP Networking- HP Forums Moderator&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jan 2013 02:34:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/wireshark-packet-sniffing/m-p/4330830#M184</guid>
      <dc:creator>Piotr Kirklewski</dc:creator>
      <dc:date>2013-01-05T02:34:08Z</dc:date>
    </item>
    <item>
      <title>Re: wireshark - packet sniffing</title>
      <link>https://community.hpe.com/t5/security-e-series/wireshark-packet-sniffing/m-p/4330831#M185</link>
      <description>Peter,&lt;BR /&gt;&lt;BR /&gt;Not going to happen with just wireshark.&lt;BR /&gt;&lt;BR /&gt;Remote-exploit.org talks about it being encrypted, and points to a Black Hat paper &lt;A href="http://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-biondi/bh-eu-06-biondi-up.pdf" target="_blank"&gt;http://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-biondi/bh-eu-06-biondi-up.pdf&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;Do a google search with 'sniff skype' and you will see it is not a trivial exercise.&lt;BR /&gt;&lt;BR /&gt;Fred</description>
      <pubDate>Tue, 24 Feb 2009 22:10:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/wireshark-packet-sniffing/m-p/4330831#M185</guid>
      <dc:creator>Fred K. Abell Jr._1</dc:creator>
      <dc:date>2009-02-24T22:10:41Z</dc:date>
    </item>
    <item>
      <title>Re: wireshark - packet sniffing</title>
      <link>https://community.hpe.com/t5/security-e-series/wireshark-packet-sniffing/m-p/4330832#M186</link>
      <description>Okay, here is an update.  This answer requires permission and may be considered hacking. It also may violate wiretapping laws. REALLY REALLY REALLY make sure it is legal and you have permission!!!!!!!&lt;BR /&gt;&lt;BR /&gt;But if you are doing research or testing, you could probably use something like Paros.  Paros is a security tool for web application vulnerability assessment. This is a man in the middle type of situation. The skype ssl's to the proxy, and the proxy ssl's onto the destination. The proxy sees everything that goes through.&lt;BR /&gt;&lt;BR /&gt;Please do not use this covertly or illegality.  &lt;BR /&gt;&lt;BR /&gt;Fred&lt;BR /&gt;</description>
      <pubDate>Tue, 12 May 2009 19:03:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/wireshark-packet-sniffing/m-p/4330832#M186</guid>
      <dc:creator>Fred K. Abell Jr._1</dc:creator>
      <dc:date>2009-05-12T19:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: wireshark - packet sniffing</title>
      <link>https://community.hpe.com/t5/security-e-series/wireshark-packet-sniffing/m-p/4330833#M187</link>
      <description>hi there,&lt;BR /&gt;&lt;BR /&gt;i am doing research on siptoskype gateway. i have used astrix for that as the skype communicate with sip only i want to see its Start of Message (SOM) or its frame message or ip header message but could not figure out how i can sneak packet of skype from wireshark,,&lt;BR /&gt;&lt;BR /&gt;any help will be acceptable</description>
      <pubDate>Wed, 16 Feb 2011 00:04:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/wireshark-packet-sniffing/m-p/4330833#M187</guid>
      <dc:creator>krepaa</dc:creator>
      <dc:date>2011-02-16T00:04:50Z</dc:date>
    </item>
    <item>
      <title>Re: wireshark - packet sniffing</title>
      <link>https://community.hpe.com/t5/security-e-series/wireshark-packet-sniffing/m-p/5922087#M188</link>
      <description>&lt;P&gt;Piotr,&lt;/P&gt;&lt;P&gt;It's all about filters with Wireshark.&amp;nbsp; You can run the capture with filters or use filters after the capture is complete to see exactly what you want.&amp;nbsp; Filter by IP or by protocol.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Check here for Display Filter Reference:&amp;nbsp; &lt;A href="http://www.wireshark.org/docs/dfref/" target="_blank"&gt;http://www.wireshark.org/docs/dfref/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Check here forHow To Set Up a Capture:&amp;nbsp; &lt;A href="http://wiki.wireshark.org/CaptureSetup" target="_blank"&gt;http://wiki.wireshark.org/CaptureSetup&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Wireshark book to use and have for ref is: &lt;A href="http://www.chappellu.com/wiresharkbook.html" target="_blank"&gt;http://www.chappellu.com/wiresharkbook.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;and of course...Laura Chappels blog: &lt;A href="http://laurachappell.blogspot.com/" target="_blank"&gt;http://laurachappell.blogspot.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other than that, you may sign up for courses at WiresharkU that are very good.&amp;nbsp; You can even get an all-access pass that is moderately priced that will allow you to see and attend all online courses for one year.&lt;/P&gt;&lt;P&gt;Good luck and hope this helps!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jan 2013 15:43:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/wireshark-packet-sniffing/m-p/5922087#M188</guid>
      <dc:creator>bspencer63</dc:creator>
      <dc:date>2013-01-04T15:43:39Z</dc:date>
    </item>
  </channel>
</rss>

