Finally the help of IT is here

Blog of computer solutions.

Program that sniffs the traffic you'll quickly.

Posted by Xaus Xavier Nadal 22nd on February 2012


Some time ago I have been using a super useful hand programita NirSoft (Breathtaking their development), I guess you already know them tools like IPNetInfo (Offers useful information about the ip you want), PasswordSecurityScanner (That shows security information about local passwords used by tools such as Outlook, Internet Explorer, ...) and if you do not know, go to his web but ( "Do not be evil") that there is much potential.

The tool that I wanted to show is SmartSniff.

With this tool we can sniff / capture traffic local wireless network or even in promiscuous mode, ie any packet which passes through the network before reaching a switch.

We can see the captured packets of talks between 2 or more computers, used their traffic, ports and local and remote addresses.

For example I've used to detect the bandwidth consumed by streaming connection to estimate in a consumption tested form the connection.

It could eventually be used to detect fraudulent traffic in a network by turning on promiscuous mode and using the driver winpcap to capture all packets because the tool even takes RAW socket able to capture TCP / IP packets without a capture driver.

After capturing a few seconds you will see everything what you can get to do. Where it goes traffic, hence, that deal size packages and ports used.

Megacrack read »

tags: , , , , , , , , , , , ,
Posted by Social | No Comments »

Security Conference in Chile.

Posted by Xaus Xavier Nadal 12th on November 2011


For all readers Chile near you communicate that on November 18 from the 8: 30 Arte Normandie in film you can attend the first technical conference on information security (hacking) in Chile called 8.8 Computer Security Conference.

Entry costs only $ 40 (20.000 pesos) and can be purchased at

The aim of this conference is to give a talk different, more alternative, where they can acquire skills and knowledge, not aimed at governability and management, are intended to make evidence of the new techniques are being used to exploit systems, recent attacks, the how they met, fought and eliminated / solved ...

They will attend several professionals from different countries like Germany, Brazil, Chile, USA and Italy.

For more information on the above link or directly following the twitter @ 8dot8

Greetings and see you soon.

tags: , ,
Posted by Conferences | No Comments »

GTranslate Your license is inactive or expired, please subscribe again!