#Session Task 15-Sniffing
#Session Task 15-Sniffing
SNIFFING
What is Sniffing/Eavesdropping?
In computer networking, sniffing or eavesdropping refers to the act of intercepting and
capturing network traffic as it travels across a network. This can be done using specialized
software tools or hardware devices called network sniffers or packet sniffers.
Sniffing can be used for legitimate purposes such as network troubleshooting, performance
monitoring, and security analysis. However, it can also be used maliciously to steal sensitive
information such as passwords, credit card numbers, or other confidential data that is
transmitted over the network.
To carry out sniffing, an attacker may deploy a sniffer on a local network or target a specific
machine or network segment using various techniques such as ARP spoofing, port scanning,
or man-in-the-middle attacks.
This type of sniffing involves capturing all packets that pass through a
network interface, regardless of their destination address. It is commonly used
for debugging and network analysis.
2. ARP Spoofing:
5. Packet Sniffing:
Packet sniffing involves capturing and analyzing individual packets of
network traffic. This can be used to identify vulnerabilities in a network or to
monitor user activity.
6. Wireless Sniffing:
Wireshark:
This is a popular network protocol analyzer that can be used to capture and
examine network traffic. It can capture traffic from a variety of
sources, including Ethernet, Wi-Fi, Bluetooth, and more.
Tcpdump:
This is a command-line tool that can be used to capture and analyze network
traffic. It is available on most Unix-based operating systems.
Ettercap:
In addition, a sniffing attack can also result in a loss of reputation and credibility for the
organization whose systems have been compromised.
Customers may lose trust in the company, resulting in
lost business and revenue.
1. Use encryption:
Use secure protocols such as HTTPS, SFTP, and SCP to transfer data over the
network.
Use strong passwords and enforce regular password changes to prevent unauthorized
access.
Regularly monitor network traffic for suspicious activity, such as unauthorized access
attempts or unusual data transfers.
References:
1. "What is a Sniffing Attack?" by Techopedia: https://www.techopedia.com/definition/24084/sniffing-
attack
2. "Sniffing Attacks: What are they and how to prevent them?" by Norton:
https://us.norton.com/internetsecurity-wifi-what-is-a-sniffing-attack.html
3. "Preventing Sniffing Attacks" by SolarWinds: https://www.solarwinds.com/resources/what-is-a-
sniffing-attack
4. "How to Detect and Prevent Sniffing Attacks" by Infosec Institute:
https://resources.infosecinstitute.com/detect-prevent-sniffing-attacks/
5. "Sniffing Attacks: How to Protect Yourself and Your Company" by Avast: https://www.avast.com/c-
sniffing-attacks