![]() ![]() ![]() The process described in the lecture boils down to 5 pointsġ) Use Analyze > Follow TCP Stream to see the conversationĢ) Save the whole conversation in raw format (the attachment is obviously inside, base64 encoded). For some reason even though I follow the process indicated in the lecture, which appears more than reasonable to me, I always end up with the creation of a corrupted attachment (PDF). While going through an Intrusion Analysis course I have encountered a demo on how to use Wireshark to extract an attachment from a sniffed SMTP session. ![]()
0 Comments
Leave a Reply. |