sniffing attacks - Sniffing Sniffing Attacks Attacks Z o u...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Sniffing Sniffing Attacks Attacks Z o u h e i r T r a b e l s i Zouheir Trabelsi 2 P l a n What is a Sniffing? How Sniffer (Program/Tool) works? NIC card’s Normal and Promiscuous modes Sniffing (hubbed and wireless) in shared LAN networks Sniffing in switched LAN networks Remotely controlled sniffers Illegal use of a Sniffer Detection and prevention of sniffing activities: Promiscuous mode detection Zouheir Trabelsi 3 Router Internet FTP Server Administrator or Hacker What is a Sniffing ? Is the process that allows a user to catch all packets on a LAN network (segment) Zouheir Trabelsi 4 In Hub based LAN Network Zouheir Trabelsi 5 In Switch based LAN Network Zouheir Trabelsi 6 In Switch based LAN Network SPAN Port MiM attack Two well-known techniques to Sniff switched LAN Zouheir Trabelsi 7 How Sniffer Works ? Bring traffic to the sniffing hosts Accept the received traffic Shared (Hub and Wireless) LAN Switched LAN: SPAN port or MiM attack Set the NIC card to the Promiscuous mode Zouheir Trabelsi 8 How Sniffer Works ? Accept the received traffic NIC: Normal mode NIC: Promiscuous mode Network Interface Card (NIC): • Normal mode : Capture only the packets sent to your machine • Promiscuous mode : Capture all packets on the network (segment) NIC: Normal mode 139.141.1.X Any packets Only packets sent to the machine Only packets sent to the machine Zouheir Trabelsi 9 Why malicious Sniffing is a real threat? • Sniffers are difficult to detect • Sniffers allow a hacker to spy a network • Sniffers allow a hacker to get sensitive and confidential information (emails, passwords, …) • Sniffers allow a hacker to watch all the activities of his colleagues, etc....
View Full Document

{[ snackBarMessage ]}

Page1 / 40

sniffing attacks - Sniffing Sniffing Attacks Attacks Z o u...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online