x

Wireshark

Look for web requests in .pcap files. These can be a treasure trove for enumeration.

Looking at the HTTP section of the intercept shows us the same headers and content we'd see from curl or Burpsuite.

Also check Line-base text data. This will be the body of the request and will contain form fields too. Note the exposed vulnerable version number in this example.

Left-click: follow link, Right-click: select node, Scroll: zoom
x