SNIFFING A NETWORK
A packet sniffer is a type of program that monitors any bit of information entering or leaving a network. it is a type of plug and play wiretap device attached to a computer that eavesdrops on network traffic
Sniffing is a technique used to intercept data in information security, tools that are used to secure network can also be used by attackers to exploit in the same network. The objective of sniffing is to steal data, such ad sensitive information,email text,etc,..
Wire tapping
A packet sniffer is a type of program that monitors any bit of information entering or leaving a network. it is a type of plug and play wiretap device attached to a computer that eavesdrops on network traffic
Wire tapping
- Wiretapping is the process of monitoring telephone and internet conversations by a thread party
- Attackers connect a listening device(hardware and software) or both to the circuit carying informations between two phones or hosts on the internet.
- It allows an attacker to monitor,access,intercept and record information contained in a data flow in a communications system
Lawful Interception
Lawful interception refers to legally intercepting data communication between teo end points for telecommunications voip,data and multiservice networks.
Packet Sniffing
Packet sniffing is a process of monitoring and capturing all data packs passing through given network using software or hardware device
Sniffing Threats
By placing a packet sniffer on a network in promiscuous mode an attacker can capture and analayze all of the network traffic with same subnet
Types Of Sniffing
Types of Sniffing attacks an attacker implements to intercept data packets traversing a network
- MAC Flooding
- DNS Poisoning
- ARP Poisoning
- DHCP Attacks
- Password Sniffing
- Spoofing Attack
- By placing a packet sniffer in a network, attackers can capture and analyze all the network traffic
- Attackers can sniff confidential information such as email and chat conversation,passwords,and web traffic
- Sniffing is broadly categorized as passive and active
- Networking layers in the osi model are designed to work with each other
- Attacker use MAC attacks,DHCP attacks,ARP poisoning attacks,Spoffing attacks and DNS poisoning tecniques to sniff network traffic
Post a Comment
Thank you for visiting Afridi's Technoworld