Quote:
Originally Posted by Rob M
The video clearly shows some of the software that they're using, specifically a piece of software designed to capture packets of traffic off the network. Given that most people are logging in over unencrypted channels this is by far the easiest way to accomplish what they showed in the video.
.
|
The software looked to be Wireshark, probably running off a wifi card in promiscuous mode.