Sniffing — Wireshark

Navigate http://ezi2care.jkm.gov.my/login and fill in the User ID and Password fields.

Start Wireshark and click Login on http://ezi2care.jkm.gov.my/login. Filter for “http” protocol results

Click on the destination 203.217.179.134. Check the description under Packet Details Pane by clicking HTML Form URL Encoded or Hypertext Transfer Protocol — search for userid and password.

On the “Host” row / line, please confirm that the IP we selected above is belongs to the ezi2care.jkm.gov.my

Tips

Alternatively, we can use “http.request.method == “POST” as the filter to show only POST methods under Packet List Pane.

--

--

--

Software engineering and film. All are work-in-progress.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

The DevOps tool arsenal: Results from ~100 DevOps/SRE surveys

SportFi Public Whitelisting Result

TryHackme: PalsForLife

10 habits that make you the best Developer

Using Let’s Encrypt and Certbot with Nginx to enable connections over HTTPS

Manage your Cypress tests along with manual ones with Testomat.io like a pro

Functional Core Imperative Shell in Elixir

3 Things to learn while Programming.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
shah.hassan

shah.hassan

Software engineering and film. All are work-in-progress.

More from Medium

[EN] TryHackMe 25 Days of Cyber Security: Day 8 Walkthrough

What is LLMNR Attack and how to mitigate

An Intro to Pagefile Forensic

How To Use John The Ripper Tool In Linux For Cracking Passwords?