WINDOWS 7 - SNIFFING
- Layout for this exercise:

- Metasploit
provides the module sniffer, what be loaded from a meterpreter
session:

- Checking
how many interfaces are available for sniffing, let's take one with
parameter "usable:true":

- The sniffing process starts on interface 2, allocating 10000 packets to the buffer:

- Some traffic is generated, for instance pinging from the attacker Kali to the victim Windows 7:

- Statistics of the sniffing process:

- Captured packets can be dumped to a file with pcap format, for instance let's name it readable_with_wireshark.pcap:

- Stopping the sniffing process:

- From
another console, captured packets can be read with Wireshark
application:

- Wireshark
shows all the traffic generated by the ping's between the attacker
and the victim:
