This exercise is one of our challenges to help you learn how to analyze PCAP files

< 1 Hr.
PCAP badge


This exercise involves analyzing network traffic captured in a PCAP file, specifically focusing on MySQL communications between a client and a server. The primary objective is to identify and extract the password for the admin user from the SQL response. You'll start by downloading the provided PCAP file and inspecting it using Wireshark, a powerful network protocol analyzer.

Throughout the analysis, you'll observe the MySQL login request and subsequent database queries. Although the MySQL client doesn't send passwords in clear text, the response from the server can still reveal sensitive information. You'll learn how to navigate through the captured data, identify key queries, and ultimately extract the necessary details. This exercise emphasizes the importance of using TLS to secure database connections, especially when they are not on the same host, to prevent unauthorized access to sensitive information.

Want to learn more? Get started with PentesterLab Pro! GO PRO