
Fetch Login TokenĬlick on the Fetch Login Token button.

Run the patched application from the previous post but don't do anything. Run Wireshark, choose Npcap Loopback Adapter, and the VM's LAN. ĭownload and install npcap from and then install Wireshark. The fix is using the npcap driver instead. Windows does not have a real loopback adapter so WinPcap driver (used by Wireshark) cannot do it. Since we have deployed our FTP and MSSQL servers locally, we need to be able to capture local traffic. Capturing Loopback Traffic on Windows with Wireshark

Thick client applications are notorious for having inadequate server-side controls and trusting the client too much. At your day job, this step is probably the best bang for your buck in terms of the number of vulnerabilities found. We do this because we need to figure out where the application talks to and using what protocol. IRL use whatever tool you are comfortable with. Now we will do more using both Wireshark and Procmon. In part 1 we did some network discovering with Procmon. DVTA - Part 2 - Cert Pinning and Login Button.They talk to some server(s) to do things. More often than not, thick client applications have some sort of network connectivity.

In this part, we will focus on network traffic. Capturing Loopback Traffic on Windows with Wireshark.
