Network Traffic Analysis
Last updated
Last updated
It's crucial that we understand the networking behind a binary. What connections it's making, what protocol it utilizes and the host it's attempting to communicate with.
This example I am running the following binary I took from HackTheBox using mono (wine will also work).
Notice that the binary is making a connection using the ldap protocol, which is an un-encryted. protocol The username and password is in plaintext.