1 00:00:00,530 --> 00:00:02,750 OK, so let's run another capture. 2 00:00:06,720 --> 00:00:16,470 and let's see if we can capture FTP, so copy and let's use running config in this example to FTP, IP 3 00:00:16,470 --> 00:00:20,400 address is this destination filename is that. 4 00:00:22,290 --> 00:00:24,120 Notice configuration has been copied. 5 00:00:25,070 --> 00:00:34,640 In Wireshark, I'll filter for FTP and hopefully you can see the this already notice username is root, password 6 00:00:34,640 --> 00:00:35,840 is GNS3 7 00:00:36,530 --> 00:00:41,710 It was as simple as that to capture the username and password used in FTP. 8 00:00:42,320 --> 00:00:48,410 I'm going to right click, click, follow, click TCP stream notice we can see the username and the 9 00:00:48,410 --> 00:00:49,100 password. 10 00:00:49,460 --> 00:00:52,040 We can see that some data was transmitted. 11 00:00:52,930 --> 00:00:59,710 So be careful using FTP in your network notice username and password as simple as that to grab that 12 00:00:59,710 --> 00:01:00,940 information off the network. 13 00:01:01,420 --> 00:01:06,730 Now that was configured on the router, so on the Cisco router 14 00:01:08,750 --> 00:01:17,720 sh run pipe include FTP, I configured the username and password on the router, and that's what 15 00:01:17,720 --> 00:01:22,010 the router use when logging into the FTP server to back up of the configuration. 16 00:01:23,430 --> 00:01:29,130 OK, I'll stop that, I shall capture and then save that so that you've got it. 17 00:01:31,730 --> 00:01:38,030 Be careful using FTP, TFTP and other protocols on your network.