1 00:00:00,210 --> 00:00:06,450 Now it's time to talk about and see it utility how to capture Mishkat is a plain text. 2 00:00:07,630 --> 00:00:14,620 Wait to you see things, so if I type and see them for listening, they're SP nine nine nine nine. 3 00:00:15,280 --> 00:00:19,740 So right now I'm listening on the bottom 80 story on the boat. 4 00:00:19,780 --> 00:00:20,860 Nine nine nine nine. 5 00:00:21,400 --> 00:00:24,310 Now open Wireshark here and from here. 6 00:00:24,310 --> 00:00:26,260 Let's choose any like that. 7 00:00:27,960 --> 00:00:30,010 So let's put it like that. 8 00:00:30,240 --> 00:00:35,540 So from here, actually, I start capturing I want to connect to our machine. 9 00:00:35,550 --> 00:00:41,970 So I would put the IP address my my network interface IP address, which is this one. 10 00:00:45,330 --> 00:00:46,170 So unshowy. 11 00:00:47,640 --> 00:00:49,070 This I.B. with this port. 12 00:00:49,620 --> 00:00:56,590 Yeah, so you can see that, yeah, it start capturing, as you can see here, it is the package. 13 00:00:57,150 --> 00:00:59,460 Now if I type I. 14 00:01:01,520 --> 00:01:06,620 This is my basswood, one, two, three, four, five, six, for example. 15 00:01:06,650 --> 00:01:08,260 OK, so we received it. 16 00:01:08,270 --> 00:01:11,770 You know, if I click here actually and if I right. 17 00:01:11,780 --> 00:01:19,400 Click Photo DCB Stream, you would find out we can find the text as plain as you can see. 18 00:01:19,430 --> 00:01:20,840 Hi, this is my password. 19 00:01:21,020 --> 00:01:22,730 And 123456. 20 00:01:23,000 --> 00:01:26,330 So using and C for communication is a bad way. 21 00:01:26,610 --> 00:01:33,800 OK, now of course we use it just as a client to connect to endpoints or check the connectivity, you 22 00:01:33,800 --> 00:01:38,630 know, like the Swiss knife, as they call it, Swiss Army knife. 23 00:01:39,650 --> 00:01:44,540 But it network be so, but don't use it for secure communication.