![]() We clicked on the first element of a POP3 exchange and SmartSniff displayed the full conversation in plain text, including the account user name and password.įurther down was a "Remote Host" we didn’t recognize, static.xx.xx.xx. ![]() If you’re trying to diagnose an email issue, for instance, you might look for a relevant "Remote Host" ( ), "Service Name" (pop3) or "Remote Port" (110). This might be an IP address or remote host you don’t recognize, an unusual port number, maybe something that’s transmitting a lot of data and you don’t know why. Click Stop to stop capture when you’ve had enough.īrowse down the report looking for interesting activity. If there’s a lot of activity this could be hard to follow. With any luck the packets should be captured and various details displayed: protocol, local and remote addresses/ ports/ hosts, service name, data size, capture time, local and remote MAC address, and more. ![]() Once capture has started, collect some emails, open a browser, visit a website or do something else internet-related. SmartSniff can capture packets using WinPcap and Microsoft Network Monitor, but is also able to use raw sockets if you’ve nothing else installed. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |