{"id":182,"date":"2011-11-06T19:41:54","date_gmt":"2011-11-06T14:11:54","guid":{"rendered":"http:\/\/askadmin.com\/?p=182"},"modified":"2011-11-07T13:07:52","modified_gmt":"2011-11-07T07:37:52","slug":"mointoring-messenger-chats-on-networks-passwordsmuch-more","status":"publish","type":"post","link":"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/","title":{"rendered":"Mointoring Messenger chats on networks ,passwords&#038;much more !"},"content":{"rendered":"<p>First of all ,I would like to let you know that, whatever I write here is for educational purpose only .Please do not abuse it one way or other.<\/p>\n<p>I think you already aware of the dangerous key loggers\u00a0 and what they do . If you want to use\u00a0 a computer in a net cafe for bank transactions, be-careful !, they might have key-loggers installed which can capture your passwords and chats .<\/p>\n<p>There are some hardware key loggers which can be attached to keyboard and others are software key-loggers which are difficult to be traced .<\/p>\n<p><a href=\"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/kelog\/\" rel=\"attachment wp-att-184\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-184\" title=\"kelog\" src=\"https:\/\/askadmin.com\/aa\/aa\/wp-content\/uploads\/2011\/11\/kelog.png\" alt=\"\" width=\"150\" height=\"92\" \/><\/a><\/p>\n<p>If\u00a0 we have physical access to someone&#8217;s computer it is very easy to view passwords ,record chats or record whatever typed\u00a0 on that computer .And sometimes, it is possible\u00a0 to receive a\u00a0 mail automatically with the recorded data ( for example- <em>spector pro<\/em>).<\/p>\n<p>If we don&#8217;t have physical access to the pc and dont want to install\u00a0 some monitoring software , Then we can use network packet capturing tools like wireshark to capture passwords ,web traffic\u00a0 on network.<\/p>\n<p>If the computers on network connected to a older ethernet hub , then it will be more easy to capture packets originating from those computers , because a ethernet hub just broadcasts the packets (sends the same packet to all the computers on network , but only the real receiver will accept it ) . So with the tools like ethereal , we can make the computer\u00a0 listen to these packets\u00a0 in promiscuous mode .<\/p>\n<p>But ethernet switch does not broadcast the traffic , it sends the frames directly to\u00a0 a node which it has to be delivered . Because it knows the mac-address of the destination .<\/p>\n<p>If the computers connected to Cisco catalyst switches , We can clone the same traffic destined to one port ,to another port . Suppose\u00a0 computer A connected to port 1 and having conversation with server S connected to port 2,then using\u00a0<em> port mirroring<\/em> feature\u00a0 we can copy the frames from port 1 to port 3 . And with the help of tools like ethereal , we can capture those packets( Should i say frames ?, since it is layer 2 data. ) and decrypt the interesting traffic.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/pics-2\/\" rel=\"attachment wp-att-192\"><img loading=\"lazy\" class=\"aligncenter size-medium wp-image-192\" title=\"pics\" src=\"https:\/\/askadmin.com\/aa\/aa\/wp-content\/uploads\/2011\/11\/pics1-500x271.gif\" alt=\"\" width=\"500\" height=\"271\" srcset=\"https:\/\/askadmin.com\/aa\/wp-content\/uploads\/2011\/11\/pics1-500x271.gif 500w, https:\/\/askadmin.com\/aa\/wp-content\/uploads\/2011\/11\/pics1.gif 501w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>The procedure to enable port mirroring on a csico\u00a0 2900 LAN switch series is ,<\/p>\n<p>1.using console cable or telnet to cisco switch ,enter global config mode<\/p>\n<p>switch#<em><span style=\"color: #99cc00;\"> config terminal<\/span><\/em><\/p>\n<p>2.issue command<\/p>\n<p>switch&lt;config&gt;# <span style=\"color: #99cc00;\"><em>monitor session 1 source interface GigabitEthernet 0\/1<\/em><\/span><\/p>\n<p>3. issue command<\/p>\n<p>switch&lt;config&gt;#<span style=\"color: #99cc00;\"><em>monitor session 1 destination interface FastEthernet 0\/20<\/em><\/span><\/p>\n<p>4.Exit from Global config mode and issue command <em><span style=\"color: #99cc00;\">write memory<\/span><\/em> to save the changes<\/p>\n<p><a href=\"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/switch\/\" rel=\"attachment wp-att-185\"><img loading=\"lazy\" class=\"alignright size-medium wp-image-185\" title=\"switch\" src=\"https:\/\/askadmin.com\/aa\/aa\/wp-content\/uploads\/2011\/11\/switch-500x249.jpg\" alt=\"\" width=\"500\" height=\"249\" srcset=\"https:\/\/askadmin.com\/aa\/wp-content\/uploads\/2011\/11\/switch-500x249.jpg 500w, https:\/\/askadmin.com\/aa\/wp-content\/uploads\/2011\/11\/switch.jpg 653w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>We can give session number anything between 1-66 . The source interface number is the port we want monitor and destination interface is the port where our computer is connected which has wire shark or any other network traffic sniffer is installed.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/switch2\/\" rel=\"attachment wp-att-197\"><img loading=\"lazy\" class=\"alignleft size-medium wp-image-197\" title=\"switch2\" src=\"https:\/\/askadmin.com\/aa\/aa\/wp-content\/uploads\/2011\/11\/switch2-500x69.gif\" alt=\"\" width=\"500\" height=\"69\" srcset=\"https:\/\/askadmin.com\/aa\/wp-content\/uploads\/2011\/11\/switch2-500x69.gif 500w, https:\/\/askadmin.com\/aa\/wp-content\/uploads\/2011\/11\/switch2.gif 594w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Now it is time to open our monitoring tools and check for the interesting traffic.<\/p>\n<p>Suppose we can use <em>messenger detect<\/em> to monitor messenger chats and contacts of\u00a0 messengers on the network .<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/messenger-detect\/\" rel=\"attachment wp-att-187\"><img loading=\"lazy\" class=\"aligncenter size-medium wp-image-187\" title=\"messenger detect\" src=\"https:\/\/askadmin.com\/aa\/aa\/wp-content\/uploads\/2011\/11\/messenger-detect-500x315.png\" alt=\"\" width=\"500\" height=\"315\" srcset=\"https:\/\/askadmin.com\/aa\/wp-content\/uploads\/2011\/11\/messenger-detect-500x315.png 500w, https:\/\/askadmin.com\/aa\/wp-content\/uploads\/2011\/11\/messenger-detect.png 930w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>If we use wire shark , we can capture http,pop3,ftp passwords too..<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/wireshark\/\" rel=\"attachment wp-att-188\"><img loading=\"lazy\" class=\"aligncenter size-medium wp-image-188\" title=\"wireshark\" src=\"https:\/\/askadmin.com\/aa\/aa\/wp-content\/uploads\/2011\/11\/wireshark-500x500.jpg\" alt=\"\" width=\"500\" height=\"500\" srcset=\"https:\/\/askadmin.com\/aa\/wp-content\/uploads\/2011\/11\/wireshark-500x500.jpg 500w, https:\/\/askadmin.com\/aa\/wp-content\/uploads\/2011\/11\/wireshark-150x150.jpg 150w, https:\/\/askadmin.com\/aa\/wp-content\/uploads\/2011\/11\/wireshark.jpg 600w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>First of all ,I would like to let you know that, whatever I write here is for educational purpose only .Please do not abuse it one way or other. I think you already aware of the dangerous key loggers\u00a0 and what they do . If you want to use\u00a0 a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false},"categories":[4],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mointoring Messenger chats on networks ,passwords&amp;much more ! - Ask Admin - A Lifelong Learner<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mointoring Messenger chats on networks ,passwords&amp;much more ! - Ask Admin - A Lifelong Learner\" \/>\n<meta property=\"og:description\" content=\"First of all ,I would like to let you know that, whatever I write here is for educational purpose only .Please do not abuse it one way or other. I think you already aware of the dangerous key loggers\u00a0 and what they do . If you want to use\u00a0 a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/\" \/>\n<meta property=\"og:site_name\" content=\"Ask Admin - A Lifelong Learner\" \/>\n<meta property=\"article:published_time\" content=\"2011-11-06T14:11:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2011-11-07T07:37:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/askadmin.com\/aa\/aa\/wp-content\/uploads\/2011\/11\/kelog.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"balu sreekanth\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/askadmin.com\/aa\/#website\",\"url\":\"https:\/\/askadmin.com\/aa\/\",\"name\":\"Ask Admin - A Lifelong Learner\",\"description\":\"Mobile App Development | IP Telephony | Linux\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/askadmin.com\/aa\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/askadmin.com\/aa\/aa\/wp-content\/uploads\/2011\/11\/kelog.png\",\"contentUrl\":\"https:\/\/askadmin.com\/aa\/aa\/wp-content\/uploads\/2011\/11\/kelog.png\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/#webpage\",\"url\":\"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/\",\"name\":\"Mointoring Messenger chats on networks ,passwords&much more ! - Ask Admin - A Lifelong Learner\",\"isPartOf\":{\"@id\":\"https:\/\/askadmin.com\/aa\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/#primaryimage\"},\"datePublished\":\"2011-11-06T14:11:54+00:00\",\"dateModified\":\"2011-11-07T07:37:52+00:00\",\"author\":{\"@id\":\"https:\/\/askadmin.com\/aa\/#\/schema\/person\/e1ff95d4a91ea001e25af3273533a345\"},\"breadcrumb\":{\"@id\":\"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/askadmin.com\/aa\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mointoring Messenger chats on networks ,passwords&#038;much more !\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/askadmin.com\/aa\/#\/schema\/person\/e1ff95d4a91ea001e25af3273533a345\",\"name\":\"balu sreekanth\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/askadmin.com\/aa\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6aebf95935573dc70f536f1003a2fb8c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6aebf95935573dc70f536f1003a2fb8c?s=96&d=mm&r=g\",\"caption\":\"balu sreekanth\"},\"sameAs\":[\"http:\/\/askadmin.com\"],\"url\":\"https:\/\/askadmin.com\/aa\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mointoring Messenger chats on networks ,passwords&much more ! - Ask Admin - A Lifelong Learner","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/","og_locale":"en_US","og_type":"article","og_title":"Mointoring Messenger chats on networks ,passwords&much more ! - Ask Admin - A Lifelong Learner","og_description":"First of all ,I would like to let you know that, whatever I write here is for educational purpose only .Please do not abuse it one way or other. I think you already aware of the dangerous key loggers\u00a0 and what they do . If you want to use\u00a0 a [&hellip;]","og_url":"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/","og_site_name":"Ask Admin - A Lifelong Learner","article_published_time":"2011-11-06T14:11:54+00:00","article_modified_time":"2011-11-07T07:37:52+00:00","og_image":[{"url":"https:\/\/askadmin.com\/aa\/aa\/wp-content\/uploads\/2011\/11\/kelog.png"}],"twitter_misc":{"Written by":"balu sreekanth","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/askadmin.com\/aa\/#website","url":"https:\/\/askadmin.com\/aa\/","name":"Ask Admin - A Lifelong Learner","description":"Mobile App Development | IP Telephony | Linux","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/askadmin.com\/aa\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/#primaryimage","inLanguage":"en-US","url":"https:\/\/askadmin.com\/aa\/aa\/wp-content\/uploads\/2011\/11\/kelog.png","contentUrl":"https:\/\/askadmin.com\/aa\/aa\/wp-content\/uploads\/2011\/11\/kelog.png"},{"@type":"WebPage","@id":"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/#webpage","url":"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/","name":"Mointoring Messenger chats on networks ,passwords&much more ! - Ask Admin - A Lifelong Learner","isPartOf":{"@id":"https:\/\/askadmin.com\/aa\/#website"},"primaryImageOfPage":{"@id":"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/#primaryimage"},"datePublished":"2011-11-06T14:11:54+00:00","dateModified":"2011-11-07T07:37:52+00:00","author":{"@id":"https:\/\/askadmin.com\/aa\/#\/schema\/person\/e1ff95d4a91ea001e25af3273533a345"},"breadcrumb":{"@id":"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/askadmin.com\/aa\/mointoring-messenger-chats-on-networks-passwordsmuch-more\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/askadmin.com\/aa\/"},{"@type":"ListItem","position":2,"name":"Mointoring Messenger chats on networks ,passwords&#038;much more !"}]},{"@type":"Person","@id":"https:\/\/askadmin.com\/aa\/#\/schema\/person\/e1ff95d4a91ea001e25af3273533a345","name":"balu sreekanth","image":{"@type":"ImageObject","@id":"https:\/\/askadmin.com\/aa\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/6aebf95935573dc70f536f1003a2fb8c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6aebf95935573dc70f536f1003a2fb8c?s=96&d=mm&r=g","caption":"balu sreekanth"},"sameAs":["http:\/\/askadmin.com"],"url":"https:\/\/askadmin.com\/aa\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/askadmin.com\/aa\/wp-json\/wp\/v2\/posts\/182"}],"collection":[{"href":"https:\/\/askadmin.com\/aa\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/askadmin.com\/aa\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/askadmin.com\/aa\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/askadmin.com\/aa\/wp-json\/wp\/v2\/comments?post=182"}],"version-history":[{"count":15,"href":"https:\/\/askadmin.com\/aa\/wp-json\/wp\/v2\/posts\/182\/revisions"}],"predecessor-version":[{"id":205,"href":"https:\/\/askadmin.com\/aa\/wp-json\/wp\/v2\/posts\/182\/revisions\/205"}],"wp:attachment":[{"href":"https:\/\/askadmin.com\/aa\/wp-json\/wp\/v2\/media?parent=182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/askadmin.com\/aa\/wp-json\/wp\/v2\/categories?post=182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/askadmin.com\/aa\/wp-json\/wp\/v2\/tags?post=182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}