Aug 8, 2013

Sniffing Images from Network Traffic using Driftnet

Sniffing image/mpeg files using driftnet

If you want to look at what people are doing on net then this is a good way to do it...driftnet allows you to see JPG and GIF images from the Network Traffic..It collects all the images and brings them under one interface...
To open driftnet follow the path>>
BackTrack > Privilege Escalation > Password Attack > Network Sniffers > driftnet

Driftnet options: -
-h Print a summary of usage.
-v Print additional details of packets captured to the terminal.
-i interface Listen to packets on interface. By default, driftnet will try to pick up traffic on all interfaces, but this does not work with all versions of pcap, on such systems, an interface must be specified. On some systems, driftnet can only use promiscuous mode if an interface is specified.
-p Do not put the interface into promiscuous mode.
-a Operate in 'adjunct mode', where driftnet gathers images for use by another program, such as Jamie Zawinski's webcollage. In this mode, no window is displayed; images are captured and saved in a temporary directory, and their names written on standard output.
-m number In adjunct mode, silently drop images if there are more than number in the temporary directory. It is assumed that another process will delete images which it has processed.
-x prefix The filename prefix to use when saving images, by default 'driftnet-'.
-d directory Use directory to store temporary files. Driftnet will clear this directory of its own temporary files on exit, but will not delete the directory or any other files.

OK now these were the options...
Once you have opened driftnet, type in

driftnet -v -i eth0

It will show this interface

And then, it will show all the images....

If you want then you can store the images in a directory in your computer .....See the options, if you type in -d then you can do it!

I will show you an example,,,

type in,

driftnet -v -d root/Desktop/filename/network interface

Thats how it done! Any queries then comment!

Previous Post
Next Post