alternative
  • Home (current)
  • About
  • Tutorial
    Technologies
    C#
    Deep Learning
    Statistics for AIML
    Natural Language Processing
    Machine Learning
    SQL -Structured Query Language
    Python
    Ethical Hacking
    Placement Preparation
    Quantitative Aptitude
    View All Tutorial
  • Quiz
    C#
    SQL -Structured Query Language
    Quantitative Aptitude
    Java
    View All Quiz Course
  • Q & A
    C#
    Quantitative Aptitude
    Java
    View All Q & A course
  • Programs
  • Articles
    Identity And Access Management
    Artificial Intelligence & Machine Learning Project
    How to publish your local website on github pages with a custom domain name?
    How to download and install Xampp on Window Operating System ?
    How To Download And Install MySql Workbench
    How to install Pycharm ?
    How to install Python ?
    How to download and install Visual Studio IDE taking an example of C# (C Sharp)
    View All Post
  • Tools
    Program Compiler
    Sql Compiler
    Replace Multiple Text
    Meta Data From Multiple Url
  • Contact
  • User
    Login
    Register

Ethical Hacking - Ethical Hacking Phases - Sniffing Tutorial

Sniffing is a process in which all the packets passing through network are monitored/observed and captured using a packet sniffer tools.

Packet Sniffers are used by network administrators to keep track of data traffic passing through their network. These are called network protocol analyzers.

One can sniff following information from a network like

  • Email traffic, FTP passwords, web traffics, telnet passwords, router configuration, chat sessions, DNS traffic, etc.

  • Can also steal sensitive information such as passwords, usernames, credit card information.

There are following tools used in sniffing are Wireshark , Ettercap ,  BetterCAP , Tcpdump , WinDump , etc. 

 

Types of Sniffing 

There are two types of sniffing attacks, active sniffing and passive sniffing. 

  • Passive Sniffing

Passive Sniffing is used on a hub network instead of switch. In this data packets are intercepted and forwarded without any form of modification. Hub device will sent traffic to all port from which attacker can easily capture traffic.

It is less intrusive and has less chances of detection.

  • Active Sniffing

Active Sniffing is used on a switched network. Which means it not only monitored and captured the packets, but it also be used to alter/switch/modify the packet using MAC  (media access control) to the destination depending on the attacker.

It is correspondingly more intrusive and has more chances of detection.

 

 

Following are the Active Sniffing Techniques −

  • MAC Flooding

  • DHCP Attacks

  • DNS Poisoning

  • Spoofing Attacks

  • ARP Poisoning

Is protocol vulnerable to sniffing?

Some of the protocol which does not encrypt there data before transmitting through network are vulnerable, and can be attack using sniffing.

Example includes-

  • Telnet and Rlogin – Keystrokes including username and password

  • Http –Send data without any encryption

  • Smtp-This protocol use to transfer mail in clear text format.

  • Nntp – Password and data sent in clear text.

  • Pop- receive email from the server in clear text.

  • Ftp - Password and data sent in clear text

  • Imap- Password and data sent in clear text

 

How to Prevent Sniffing Attacks 

  • Wiretapping- Tapping into physical transmission medium to detect anomalies.

  • Hardware Protocol Analyzer

  • Avoid Untrusted network

  • Encryption

  • Network Scanning and monitoring

What is Spoofing Attack?

In spoofing, the attacker steals the credentials of a user using masquerading(i.e masking the attacker identity) and uses them in a system as a authenticate user. Spoofing attacks are also referred to as man-in-the–middle attacks since the attacker gets in the middle of a user and a system. 

As the identities on a network are mainly categories in term of IP and MAC address,

Therefore two type of spoofing are-

  1. IP Spoofing

  2. MAC Spoofing

 

 

  1. IP Spoofing

It is a process in which hacker send the packet onto the network with the source IP address of normal user.

In this process, detection tool will considered the packet from genuine source and this packet will get bypass from firewall.

  1. MAC Spoofing

MAC address is a unique identifier that is assigned to a NIC (Network Interface Controller/ Card).

In this process, attacker scan the network to find out authenticated mac address of the user and change their mac address to that of users.

Which help them to mask there identity over the network.

Ethical Hacking

Ethical Hacking

  • Introduction
  • Overview
    • Information Technology
    • Ethical Hacking
    • Types Of Hacker
    • Phase Of Hacking
  • Environmental Setup
    • Download Virtual Box
    • Install Kali Linux OS in Virtual Box
    • Resize Kali Linux To Full Screen
  • Ethical Hacking Phases
    • Common Technique to Gather Information
    • Reconnaisance / Footprinting
    • Fingerprinting
    • Sniffing
    • ARP Poisioning
    • SQL Injection
    • Cross Site Scripting
    • Social Engineering
    • Denial of service Attack
    • Session Hijacking

About Fresherbell

Best learning portal that provides you great learning experience of various technologies with modern compilation tools and technique

Important Links

Don't hesitate to give us a call or send us a contact form message

Terms & Conditions
Privacy Policy
Contact Us

Social Media

© Untitled. All rights reserved. Demo Images: Unsplash. Design: HTML5 UP.