Hi all,
can some one help me in sorting out that how cain and ettercap sniff authentication protocols (not arp poisoning etc) how they decrypt them as i didnot find any technical information on their sites. The concept and the weakness in protocols and how they exploit those protocol weakness.

Thanks