<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Xplico%3A_pentest_tool_di_kali_linux</id>
	<title>Xplico: pentest tool di kali linux - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Xplico%3A_pentest_tool_di_kali_linux"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Xplico:_pentest_tool_di_kali_linux&amp;action=history"/>
	<updated>2026-04-20T02:32:15Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Xplico:_pentest_tool_di_kali_linux&amp;diff=47349&amp;oldid=prev</id>
		<title>Onnowpurbo: Created page with &quot;sumber: https://codingsec.net/2016/04/xplico-penetration-testing-tools-kali-linux/    The goal of Xplico is extract from a network traffic capture the applications data contai...&quot;</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Xplico:_pentest_tool_di_kali_linux&amp;diff=47349&amp;oldid=prev"/>
		<updated>2017-03-27T01:10:58Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;sumber: https://codingsec.net/2016/04/xplico-penetration-testing-tools-kali-linux/    The goal of Xplico is extract from a network traffic capture the applications data contai...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;sumber: https://codingsec.net/2016/04/xplico-penetration-testing-tools-kali-linux/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The goal of Xplico is extract from a network traffic capture the applications data contained.&lt;br /&gt;
For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isn’t a network protocol analyzer. Xplico is an open source Network Forensic Analysis Tool (NFAT).&lt;br /&gt;
Xplico is released under the GNU General Public License and with some scripts under Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) License. For more details seeLicense.&lt;br /&gt;
&lt;br /&gt;
Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone who thinks it’s a good idea to try to use this to attempt to hack systems that do not belong to you&lt;br /&gt;
&lt;br /&gt;
==instalation==&lt;br /&gt;
&lt;br /&gt;
to instal xplico open a new terminal ans type&lt;br /&gt;
&lt;br /&gt;
apt-get install xplico&lt;br /&gt;
&lt;br /&gt;
==using xplico==&lt;br /&gt;
&lt;br /&gt;
to use xplico open your web browser and type http://localhost:9876 &lt;br /&gt;
&lt;br /&gt;
22&lt;br /&gt;
&lt;br /&gt;
If xplico was not started :&lt;br /&gt;
&lt;br /&gt;
877&lt;br /&gt;
&lt;br /&gt;
open a new terminal and type service xplico start&lt;br /&gt;
&lt;br /&gt;
75&lt;br /&gt;
&lt;br /&gt;
open your browser and logg in  as admin , you will see a webpage like that&lt;br /&gt;
&lt;br /&gt;
sellect new case , type case name then creat&lt;br /&gt;
&lt;br /&gt;
xp&lt;br /&gt;
&lt;br /&gt;
then sellect that case&lt;br /&gt;
&lt;br /&gt;
xp1&lt;br /&gt;
&lt;br /&gt;
then select new session&lt;br /&gt;
&lt;br /&gt;
xp3&lt;br /&gt;
&lt;br /&gt;
name a session and click creat&lt;br /&gt;
&lt;br /&gt;
xp4&lt;br /&gt;
&lt;br /&gt;
and you will get a webpage like that&lt;br /&gt;
&lt;br /&gt;
xp5&lt;br /&gt;
&lt;br /&gt;
now we gonna launch “ettercap” to start capturing traffic&lt;br /&gt;
&lt;br /&gt;
open a new terminal and type ettercap -G &lt;br /&gt;
&lt;br /&gt;
xp6&lt;br /&gt;
&lt;br /&gt;
now we gonna select unified sniffing&lt;br /&gt;
&lt;br /&gt;
xp7&lt;br /&gt;
&lt;br /&gt;
here we need to chose our network interface and then click OK&lt;br /&gt;
&lt;br /&gt;
xp8&lt;br /&gt;
&lt;br /&gt;
now we gonna make a scan for hosts&lt;br /&gt;
&lt;br /&gt;
xp9&lt;br /&gt;
&lt;br /&gt;
now we have all hostes in our local network, next we need to chose a target  to do that just select an ip address and click Add to target 1  also we can add more than one target .&lt;br /&gt;
&lt;br /&gt;
in this tutorial im gonna select a windows xp machine as a target&lt;br /&gt;
&lt;br /&gt;
xp10&lt;br /&gt;
&lt;br /&gt;
select  mitm and click ok to launch that  &lt;br /&gt;
&lt;br /&gt;
xp11&lt;br /&gt;
&lt;br /&gt;
and then start sniffing&lt;br /&gt;
&lt;br /&gt;
xp12&lt;br /&gt;
&lt;br /&gt;
now we are enable to sniff traffic going between the systeme and our gateway&lt;br /&gt;
&lt;br /&gt;
now we go back to xplico select eth0 interface and click start&lt;br /&gt;
&lt;br /&gt;
xp13&lt;br /&gt;
&lt;br /&gt;
then we move over to our windows xp machine and go to internet explorer and search for exempel for cats as we can see here&lt;br /&gt;
&lt;br /&gt;
xp14&lt;br /&gt;
&lt;br /&gt;
then go back to our kali linux machine and click stop sniffing xp15&lt;br /&gt;
&lt;br /&gt;
browse through between data collected on that traffic graphs,web, mail,chat ….&lt;br /&gt;
&lt;br /&gt;
we can show the google traffic&lt;br /&gt;
&lt;br /&gt;
xp16&lt;br /&gt;
&lt;br /&gt;
and if we select images we can see all images traffic&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
&lt;br /&gt;
* https://codingsec.net/2016/04/xplico-penetration-testing-tools-kali-linux/&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>