![]() ![]() However, it is possible to run IRC while encrypted with TLS/SSL as well. The server will then respond with a response code and optional data regarding the status of the request or containing the information that the user wanted.īy default, IRC is a plaintext protocol, meaning that anyone with access to an organization’s network traffic could read the data flowing over IRC. ![]() A client can send a certain command (like NICK) along with a set of optional parameters. However, this cannot be used during live capture (like many protocol-based filters), so it is recommended to filter based on IRC ports (like 6667 instead).Īs shown in the image above, IRC is a text-based protocol. ![]() IRC traffic can be filtered in Wireshark using the irc command. While the presence of IRC on the traffic does not necessarily indicate an attack, it might be worth investigating since IRC is commonly used for communication by botnets. However, its usage has declined over time as alternatives (like Slack) have become popular. IRC is a simple but powerful protocol for text-based chat. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |