
Going through the packets, select the one that says SQL batch and see the SQL query is created client-side and sent out. SQL queries are created on the client and sent outside.

Choosing the TDS dissector for MSSQL trafficĪnd now packets are annotated. This tells Wireshark to decode all traffic to that port using the TDS dissector. Then select TDS for the combo box under Current. To decode the traffic with Wireshark, right-click on any outgoing packet and select Decode As. MSSQL traffic captured in Wiresharkįirst, we see the TCP connection and then the login traffic to port 49622. ClientHello, ServerHello, and the rest.Ĭlear the capture and this time login with a valid set of non-admin credentials (e.g. Looking at the capture, it's clear what the application is doing. We already know where it goes, but let's inspect it with Wireshark. Fetch Login TokenĬlick on the Fetch Login Token button. Run the patched application from the previous post but don't do anything. Run Wireshark, choose Npcap Loopback Adapter, and the VM's LAN.
#Wireshark loopback windows install#
ĭownload and install npcap from and then install Wireshark.
#Wireshark loopback windows driver#
The fix is using the npcap driver instead. Windows does not have a real loopback adapter so WinPcap driver (used by Wireshark) cannot do it. Since we have deployed our FTP and MSSQL servers locally, we need to be able to capture local traffic. Capturing Loopback Traffic on Windows with Wireshark Thick client applications are notorious for having inadequate server-side controls and trusting the client too much. At your day job, this step is probably the best bang for your buck in terms of the number of vulnerabilities found. We do this because we need to figure out where the application talks to and using what protocol. IRL use whatever tool you are comfortable with. Now we will do more using both Wireshark and Procmon. In part 1 we did some network discovering with Procmon. DVTA - Part 2 - Cert Pinning and Login Button.


They talk to some server(s) to do things. More often than not, thick client applications have some sort of network connectivity. In this part, we will focus on network traffic.
