Podcast
Questions and Answers
Which of the following describes passive sniffing?
Which of the following describes passive sniffing?
What is the primary function of a sniffer in promiscuous mode?
What is the primary function of a sniffer in promiscuous mode?
Which of the following is NOT a technique associated with active sniffing?
Which of the following is NOT a technique associated with active sniffing?
What vulnerability arises from open switch ports in enterprises?
What vulnerability arises from open switch ports in enterprises?
Signup and view all the answers
What is the main function of a protocol analyzer?
What is the main function of a protocol analyzer?
Signup and view all the answers
What is the role of the Content Addressable Memory (CAM) table in a switch?
What is the role of the Content Addressable Memory (CAM) table in a switch?
Signup and view all the answers
Which type of traffic is least likely to be sensitive information obtained through sniffing?
Which type of traffic is least likely to be sensitive information obtained through sniffing?
Signup and view all the answers
Which type of wiretapping involves altering or injecting data into the communication?
Which type of wiretapping involves altering or injecting data into the communication?
Signup and view all the answers
Which of the following protocols is NOT vulnerable to sniffing?
Which of the following protocols is NOT vulnerable to sniffing?
Signup and view all the answers
How does ARP poisoning contribute to network attacks?
How does ARP poisoning contribute to network attacks?
Signup and view all the answers
How do sniffers interact with the OSI model layers?
How do sniffers interact with the OSI model layers?
Signup and view all the answers
Which hardware protocol analyzer is NOT explicitly listed?
Which hardware protocol analyzer is NOT explicitly listed?
Signup and view all the answers
What is the primary function of a hardware protocol analyzer?
What is the primary function of a hardware protocol analyzer?
Signup and view all the answers
What significant limitation does the use of hubs present in network sniffing?
What significant limitation does the use of hubs present in network sniffing?
Signup and view all the answers
What legal requirement is necessary for lawful interception of data communication?
What legal requirement is necessary for lawful interception of data communication?
Signup and view all the answers
What type of data is most vulnerable to interception by sniffers?
What type of data is most vulnerable to interception by sniffers?
Signup and view all the answers
What does PRISM primarily aim to collect?
What does PRISM primarily aim to collect?
Signup and view all the answers
Which of the following characteristics best describes the Data Link layer in relation to sniffing?
Which of the following characteristics best describes the Data Link layer in relation to sniffing?
Signup and view all the answers
What characterizes passive wiretapping?
What characterizes passive wiretapping?
Signup and view all the answers
Which of the following statements is true regarding wiretapping?
Which of the following statements is true regarding wiretapping?
Signup and view all the answers
Which of the following is a consequence of data being sent in clear text?
Which of the following is a consequence of data being sent in clear text?
Signup and view all the answers
Identify the type of data most commonly targeted by attackers in sniffing attacks.
Identify the type of data most commonly targeted by attackers in sniffing attacks.
Signup and view all the answers
What does the term 'central management server (CMS)' refer to in lawful interception?
What does the term 'central management server (CMS)' refer to in lawful interception?
Signup and view all the answers
What potential risk is associated with protocols like POP and IMAP in the context of network security?
What potential risk is associated with protocols like POP and IMAP in the context of network security?
Signup and view all the answers
What is the primary consequence of ARP poisoning on a network?
What is the primary consequence of ARP poisoning on a network?
Signup and view all the answers
Which of the following best describes MAC duplicating?
Which of the following best describes MAC duplicating?
Signup and view all the answers
What does DNS poisoning fundamentally alter?
What does DNS poisoning fundamentally alter?
Signup and view all the answers
Which of the following is NOT a possible outcome from packet sniffing?
Which of the following is NOT a possible outcome from packet sniffing?
Signup and view all the answers
What feature of Wireshark enhances its functionality for network analysis?
What feature of Wireshark enhances its functionality for network analysis?
Signup and view all the answers
What is the primary purpose of using forged ARP replies in a network attack?
What is the primary purpose of using forged ARP replies in a network attack?
Signup and view all the answers
What technology does Wireshark utilize to enhance its packet capturing capability?
What technology does Wireshark utilize to enhance its packet capturing capability?
Signup and view all the answers
Which attack typically involves creating fake DNS entries that resemble legitimate sites?
Which attack typically involves creating fake DNS entries that resemble legitimate sites?
Signup and view all the answers
What is the primary consequence of MAC flooding on a network?
What is the primary consequence of MAC flooding on a network?
Signup and view all the answers
Which command is NOT part of configuring port security on a Cisco switch?
Which command is NOT part of configuring port security on a Cisco switch?
Signup and view all the answers
What is Address Resolution Protocol (ARP) primarily used for?
What is Address Resolution Protocol (ARP) primarily used for?
Signup and view all the answers
Which of the following best describes ARP spoofing?
Which of the following best describes ARP spoofing?
Signup and view all the answers
What happens if a MAC address is not found in an ARP table?
What happens if a MAC address is not found in an ARP table?
Signup and view all the answers
What is one of the primary goals of implementing port security on a switch?
What is one of the primary goals of implementing port security on a switch?
Signup and view all the answers
Which statement about the ARP protocol is accurate?
Which statement about the ARP protocol is accurate?
Signup and view all the answers
When configuring port security, what does the command 'snmp-server enable traps port-security trap-rate 5' achieve?
When configuring port security, what does the command 'snmp-server enable traps port-security trap-rate 5' achieve?
Signup and view all the answers
Study Notes
Sniffing Overview
- Sniffing is a process of monitoring and capturing all data packets passing through a network
- It's a form of wiretapping applied to computer networks
- Many enterprise switch ports are open, allowing anyone in the same physical location to plug into the network using an Ethernet cable
- Sensitive information obtained through sniffing includes syslog traffic, telnet passwords, router configuration, and FTP passwords
- Data includes email traffic, web traffic, and chat sessions
- Sniffing can be passive or active. Passive involves monitoring without sending additional data packets whereas active involves injecting requests into the network
How a Sniffer Works
- A sniffer turns the network interface card (NIC) of a system to promiscuous mode, allowing it to listen to all transmitted data on its segment
- Attackers use the NIC to monitor all network traffic to a device
- Attackers decode the encapsulated information in the data packets
Passive Sniffing
- Passive sniffing involves monitoring packets sent by others without sending additional data packets
- It is performed through a hub, where all traffic is sent to all ports
- Attackers can easily capture traffic going through the hub in a network that employs hubs
- Hub usage is outdated, as modern networks use switches
Active Sniffing
- Active sniffing is used on switch-based networks
- It involves injecting address resolution packets (ARP) into the network to flood the switch's Content Addressable Memory (CAM) table
- The CAM table tracks which host is connected to which port
- Active sniffing techniques include MAC Flooding, DNS Poisoning, ARP Poisoning, DHCP Attacks, Switch Port Stealing, and Spoofing Attack.
Attacker Hacks the Network Using Sniffers
- Attacker connects laptop to a network switch port
- Uses discovery tools to learn network topology
- Identifies victim's machine to target attacks
- Poisons victim using ARP spoofing techniques
- Redirects victim's traffic to the attacker
- Extracting passwords and sensitive data from redirected traffic
Protocols Vulnerable to Sniffing
- Protocols that send data in clear text are vulnerable
- This includes protocols like HTTP, Telnet, Rlogin, POP, IMAP, SMTP, NNTP and FTP
Sniffing in the Data Link Layer of the OSI Model
- Sniffers operate at the Data Link layer of the OSI model
- Layers in OSI model work independently
- Independent functioning of layers ensures that the upper layers aren't aware of the lower-layer sniffing
Hardware Protocol Analyzer
- A specialized hardware equipment for capturing network traffic signals without altering the traffic or cable segment
- Used to monitor network usage and identify malicious network traffic
- Decodes data packets and analyzes their content based on certain rules
- Allows attacker visibility into individual data bytes of each passing packet
Hardware Protocol Analyzers (Examples)
- Keysight N2X N5540A
- Keysight E2960B
- RADCOM PrismLite Protocol Analyzer
- RADCOM Prism UltraLite Protocol Analyzer
- FLUKE Networks OptiView® XG Network Analyzer
- FLUKE Networks OneTouch™ AT Network Assistant
Wiretapping
- Monitoring telephone and internet conversations by a third party
- Attackers connect listening devices to circuits carrying information
- Allows attackers to monitor, intercept, access, and record data in a communication system.
- Active and Passive techniques exist, with Passive only monitoring while Active monitors, records, alters or injects traffic within the system.
Lawful Interception
- Legally intercepting data communication to conduct surveillance on communications, VoIP, data, and multiservice networks
- Requires court order/request for wiretap.
- System for real-time reconstruction of intercepted data
- Law enforcement access to intercepted data whenever required.
Wiretapping Case Study - PRISM
- PRISM is a planning tool for resource integration, synchronization, and management designed to collect and process foreign intelligence that passes through American servers
- NSA wiretaps a huge amount of foreign internet traffic routed through or saved on U.S. servers
MAC Flooding
- Flooding the CAM table of a switch with fake MAC addresses and IP pairs until it is full
- Switch then behaves as a hub, broadcasting packets to all machines
- Attackers can sniff the traffic easily.
How to Defend Against MAC Attacks
- Use port security on Cisco switches to restrict inbound traffic
- Limit the number of allowed MAC addresses per switch port
Address Resolution Protocol (ARP)
- Stateless protocol for resolving IP addresses to machine (MAC) addresses.
- Network devices broadcast ARP queries to discover other machines' MAC addresses
ARP Spoofing Attack
- Forged ARP packets to send data to the attacker's machine
- ARP spoofing involves creating numerous forged ARP requests and reply packets
- Overloads the switch, enabling sniffers to access all network traffic
- Spoofing involves flooding target computers' ARP cache with forged entries
ARP Poisoning Threats
- Packet sniffing
- Session hijacking
- VoIP call tapping
- Data manipulation
- Man-in-the-middle attack
- Denial-of-service (DoS) attack
MAC Spoofing/Duplicating
- Launching a MAC attack by sniffing a network for MAC addresses of active clients
- Re-using a legitimate user's MAC address to intercept traffic intended for that user.
DNS Poisoning Techniques
- Tricks a DNS server into accepting false IP addresses for a specified domain
- Attacker inserts malicious code into the DNS server
- Victims get redirected to malicious websites (DNS cache poisoning).
Sniffing Tool: Wireshark
- A network protocol analyzer for capturing and interactively browsing network traffic (Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI networks)
- Usable on computer networks
- Allows capture of live traffic and capturing files editable by command line using filters.
How to Defend Against Sniffing
- Use HTTPS to secure user credentials
- Employ switches instead of hubs for targeted traffic delivery
- Utilize Secure File Transfer Protocol (SFTP)
- Enable strong encryption protocols (WPA2) on wireless networks
- Retrieve MAC addresses directly from the network interface card (NIC)
- Use tools that determine if network interface cards (NICs) are running in promiscuous mode
How to Detect Sniffing
- Identify machines running in promiscuous mode
- Monitor IDS for MAC address changes (e.g., router's MAC changes)
- Use network tools like Capsa Network Analyzer to detect unusual packets.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge of networking security concepts related to sniffing techniques. This quiz covers passive and active sniffing, highlighting the differences and functionalities of sniffers in various modes. Perfect for students studying cybersecurity or network security.