Search the Community
Showing results for tags 'Wireshark'.
Found 4 results
-
Hi all, Does anyone know the security quality of masked data in JSON Payloads? Obviously no substitue for HTTPS or a VPN but whats the general thoughts on it? Cheers
-
Hi all, I'm hoping for an answer on this, i'll show you the setup first then the question. Here's the setup: Linux server running web server and using AirVPN(Eddie) port forwarding a HTTP port 80 web page with chat function----(no HTTPS) I I I Connected to Internet I I Serving the webpage using AirVPN Exit IP and Forwarded Port I I Windows 10 client connecting to AirVPN Exit IP and Port via web browser and then using the web chat service in http not in https. The Windows 10 client is not running a VPN or any special software. The Question: Is the connection between the client and the AirVPN exit node encrypted even though the client doesnt have VPN software installed? I know that that might sound silly but I would have thought the answer would have been no, so to check this I MITM my WiFi connection but could only see QUIC, TCP, UDP and HTTP coming from the client in Wireshark. The QUIC UDP were encrypted payloads and I searched the HTTP packets data for the plain text messages I was sending in the chat page but couldn't find it, in fact none of the packets were readable other than the source and destination parts. So to recap: Is the clients connection to the AirVPN Exit nodes IP and PORT encrypted? and if so how when im not running a vpn? is it the session to the airvpn exit node? can the data be read in plain text the same way it would on a normal LAN if i was doing packet capture on the HTTP? Please discuss
-
hi, i've started airvpn new experimental client and made wireshark filter: not host 192.168.0.1 and not udp so i see that my pc sends to vpn server via quic protocol. is it normal? also may be can you advice other filters to check if airvpn client works proper. arp queries are ok in logs?