Package capture.

It's time learn to capture our traffic with a tool called tcpdump so we can analyze it later with WireShark.

Let's get tcpdump on our victim.

apt install tcpdump

And let's see how it works. Open up another terminal and log into Victim.

docker exec -it victim /bin/bash

Let's start the capture in one of the Victim terminals:

tcpdump -s 65535 -i any -v -w my_capture.pcap

In the other Victim terminal let's ping the reverse-proxy and visit main reverse-proxy page:

ping and curl test
tcpdump test

You can stop the capture with CTRL + C.

Now that we have our capture file, we can transfer it to our Desktop and read it with WireShark.
Get the ID of your Victim container with docker ps and move the file like we did with our agent:

move the capture

Now it's time to download WireShark.
WireShark is a great network protocol analyzer and will let us see deep into our captured conversations.
When you install it, open the my_capture.pcap file.

capture

You can see so many cool things!
Ping sends a request and then receives a reply!
You can see the handshake happen when we curled the reverse-proxy server, and the key exchange!
We can even inspect the encrypted packets!
Truly WireShark is a marvel.

Previous step

Next step

Published