Podcast
Questions and Answers
Which protocol is known to transmit data in clear text?
Which protocol is known to transmit data in clear text?
- SSH
- HTTPS
- FTP (correct)
- SSL
At which layer of the OSI model do sniffers operate?
At which layer of the OSI model do sniffers operate?
- Application layer
- Network layer
- Data Link layer (correct)
- Transport layer
What defines active wiretapping?
What defines active wiretapping?
- Captures data without affecting it
- Only monitors and records traffic
- Intercepts data without altering it
- Injects data into the communication (correct)
What is the primary function of a hardware protocol analyzer?
What is the primary function of a hardware protocol analyzer?
What does lawful interception involve?
What does lawful interception involve?
Which of the following is a characteristic of passive wiretapping?
Which of the following is a characteristic of passive wiretapping?
Which of these protocols is NOT considered compromised regarding sniffing?
Which of these protocols is NOT considered compromised regarding sniffing?
What is the main purpose of wiretapping?
What is the main purpose of wiretapping?
What technique does DNS poisoning utilize to mislead a DNS server?
What technique does DNS poisoning utilize to mislead a DNS server?
Which of the following is a recommended way to defend against network sniffing?
Which of the following is a recommended way to defend against network sniffing?
Which method can be used to capture and analyze network traffic?
Which method can be used to capture and analyze network traffic?
What is one way an attacker can utilize MAC addresses to perform attacks?
What is one way an attacker can utilize MAC addresses to perform attacks?
Which protocol should be used instead of FTP for secure file transfers?
Which protocol should be used instead of FTP for secure file transfers?
Which of the following attacks involves manipulating the cache of a DNS server?
Which of the following attacks involves manipulating the cache of a DNS server?
What type of network traffic does Wireshark capture?
What type of network traffic does Wireshark capture?
How can one detect if any network interfaces are running in promiscuous mode?
How can one detect if any network interfaces are running in promiscuous mode?
What is the purpose of an ARP request?
What is the purpose of an ARP request?
Which of the following describes ARP poisoning?
Which of the following describes ARP poisoning?
What threat involves diverting communications between two machines through an attacker's PC?
What threat involves diverting communications between two machines through an attacker's PC?
How can a MAC duplicating attack be executed?
How can a MAC duplicating attack be executed?
What is the primary function of a sniffer in a network?
What is the primary function of a sniffer in a network?
Which type of sniffing involves monitoring packets without injecting any additional traffic?
Which type of sniffing involves monitoring packets without injecting any additional traffic?
What happens after ARP requests and replies flood a switch?
What happens after ARP requests and replies flood a switch?
What happens during active sniffing in a switch-based network?
What happens during active sniffing in a switch-based network?
Which of the following is NOT a threat associated with ARP poisoning?
Which of the following is NOT a threat associated with ARP poisoning?
What technique can an attacker use in active sniffing to redirect traffic from the victim's machine?
What technique can an attacker use in active sniffing to redirect traffic from the victim's machine?
What is a common method used by attackers in ARP spoofing?
What is a common method used by attackers in ARP spoofing?
What does a switch do in 'forwarding mode'?
What does a switch do in 'forwarding mode'?
What type of traffic can potentially be captured by sniffers?
What type of traffic can potentially be captured by sniffers?
In a hub-based network, what advantage does passive sniffing provide?
In a hub-based network, what advantage does passive sniffing provide?
What is a possible effect of MAC flooding in a network?
What is a possible effect of MAC flooding in a network?
What is the first step an attacker takes when using sniffers to hack a network?
What is the first step an attacker takes when using sniffers to hack a network?
What is the primary function of the PRISM tool?
What is the primary function of the PRISM tool?
Which of the following describes MAC flooding?
Which of the following describes MAC flooding?
What is one of the key defenses against MAC flooding attacks?
What is one of the key defenses against MAC flooding attacks?
What does Address Resolution Protocol (ARP) primarily do?
What does Address Resolution Protocol (ARP) primarily do?
What data flow speed is reported for Europe in the context of wiretap rates?
What data flow speed is reported for Europe in the context of wiretap rates?
Which component allows law enforcement to access intercepted data?
Which component allows law enforcement to access intercepted data?
Which of the following is NOT part of the recommended port security configuration?
Which of the following is NOT part of the recommended port security configuration?
Which area has the highest data flow in hours related to wiretapping?
Which area has the highest data flow in hours related to wiretapping?
DNS poisoning tricks a DNS server into believing it has received authentic information.
DNS poisoning tricks a DNS server into believing it has received authentic information.
Wireshark captures packets only on the networks supported by Ethernet.
Wireshark captures packets only on the networks supported by Ethernet.
Using a switch instead of a hub can help protect data by delivering it only to the intended recipient.
Using a switch instead of a hub can help protect data by delivering it only to the intended recipient.
A common method for attackers to carry out a DNS attack is by creating fake DNS entries with the same name as legitimate servers.
A common method for attackers to carry out a DNS attack is by creating fake DNS entries with the same name as legitimate servers.
Retrieving the MAC address directly from the OS is recommended to prevent MAC address spoofing.
Retrieving the MAC address directly from the OS is recommended to prevent MAC address spoofing.
Sniffing is a method used to capture and monitor data packets in a network.
Sniffing is a method used to capture and monitor data packets in a network.
Active sniffing requires the use of switches to be effective, while passive sniffing does not.
Active sniffing requires the use of switches to be effective, while passive sniffing does not.
In passive sniffing, the attacker can send data packets into the network traffic.
In passive sniffing, the attacker can send data packets into the network traffic.
MAC flooding is an example of an active sniffing technique.
MAC flooding is an example of an active sniffing technique.
A sniffer can be used to turn a standard NIC into promiscuous mode to listen to all transmitted data.
A sniffer can be used to turn a standard NIC into promiscuous mode to listen to all transmitted data.
Sniffers operate at the Network layer of the OSI model.
Sniffers operate at the Network layer of the OSI model.
Active wiretapping involves only monitoring and recording traffic.
Active wiretapping involves only monitoring and recording traffic.
A hardware protocol analyzer can capture and analyze individual data bytes passing through a cable.
A hardware protocol analyzer can capture and analyze individual data bytes passing through a cable.
Lawful interception requires consent from one of the involved parties.
Lawful interception requires consent from one of the involved parties.
All data sent via FTP is encrypted by default.
All data sent via FTP is encrypted by default.
Passive wiretapping is considered a criminal offense in all circumstances.
Passive wiretapping is considered a criminal offense in all circumstances.
IMAP is a protocol known for sending passwords in clear text.
IMAP is a protocol known for sending passwords in clear text.
A compromised protocol guarantees secure data transmission.
A compromised protocol guarantees secure data transmission.
Sniffers can operate independently of the upper layers and remain undetected.
Sniffers can operate independently of the upper layers and remain undetected.
Telephone conversations can be monitored through wiretapping.
Telephone conversations can be monitored through wiretapping.
What is the primary consequence of DNS poisoning?
What is the primary consequence of DNS poisoning?
How does Wireshark primarily capture network traffic?
How does Wireshark primarily capture network traffic?
Which method is effective in preventing MAC address spoofing?
Which method is effective in preventing MAC address spoofing?
What is the purpose of using a switch instead of a hub in network configuration?
What is the purpose of using a switch instead of a hub in network configuration?
Which technique can be employed to recognize if a machine is in promiscuous mode?
Which technique can be employed to recognize if a machine is in promiscuous mode?
What is the primary difference between passive and active sniffing in a network?
What is the primary difference between passive and active sniffing in a network?
Which technique allows an attacker to redirect traffic using ARP spoofing?
Which technique allows an attacker to redirect traffic using ARP spoofing?
What makes passive sniffing more advantageous than active sniffing?
What makes passive sniffing more advantageous than active sniffing?
Which kind of network equipment primarily exposes vulnerabilities to sniffing attacks?
Which kind of network equipment primarily exposes vulnerabilities to sniffing attacks?
What does MAC flooding aim to achieve in terms of network security?
What does MAC flooding aim to achieve in terms of network security?
Which of the following statements is true regarding active wiretapping?
Which of the following statements is true regarding active wiretapping?
What is a primary function of hardware protocol analyzers?
What is a primary function of hardware protocol analyzers?
Which protocol is typically associated with transmitting data in clear text?
Which protocol is typically associated with transmitting data in clear text?
What does passive wiretapping primarily allow an attacker to do?
What does passive wiretapping primarily allow an attacker to do?
Which of the following could be considered a limitation of sniffers at the Data Link layer?
Which of the following could be considered a limitation of sniffers at the Data Link layer?
What distinguishes lawful interception from other types of data interception?
What distinguishes lawful interception from other types of data interception?
What is a common tool for monitoring network usage and identifying malicious traffic?
What is a common tool for monitoring network usage and identifying malicious traffic?
Which of the following protocols is vulnerable to sniffing due to transmitting data in clear text?
Which of the following protocols is vulnerable to sniffing due to transmitting data in clear text?
What technique is primarily used to monitor and capture telephone conversations by unauthorized parties?
What technique is primarily used to monitor and capture telephone conversations by unauthorized parties?
Which of the following statements is true regarding sniffing tools?
Which of the following statements is true regarding sniffing tools?
DNS poisoning results in the replacement of a true IP address with a false one at the DNS level.
DNS poisoning results in the replacement of a true IP address with a false one at the DNS level.
Wireshark can capture packets from all network types without any limitations.
Wireshark can capture packets from all network types without any limitations.
Using HTTPS instead of HTTP is a recommended approach to protect sensitive data during transmission.
Using HTTPS instead of HTTP is a recommended approach to protect sensitive data during transmission.
Creating fake DNS entries is not a technique used in DNS attacks.
Creating fake DNS entries is not a technique used in DNS attacks.
Retrieving the MAC address from the operating system helps in preventing MAC address spoofing.
Retrieving the MAC address from the operating system helps in preventing MAC address spoofing.
Active sniffing involves monitoring packets without injecting additional data into the network traffic.
Active sniffing involves monitoring packets without injecting additional data into the network traffic.
Passive sniffing can capture all traffic in a hub-based network because the hub sends traffic to all ports.
Passive sniffing can capture all traffic in a hub-based network because the hub sends traffic to all ports.
A common active sniffing technique is DHCP attacks, which can lead to network disruption and data theft.
A common active sniffing technique is DHCP attacks, which can lead to network disruption and data theft.
MAC flooding can cause a switch to behave like a hub, exposing data to all connected devices.
MAC flooding can cause a switch to behave like a hub, exposing data to all connected devices.
Sniffing tools can only capture unencrypted data, making them ineffective against secure communications.
Sniffing tools can only capture unencrypted data, making them ineffective against secure communications.
Sniffers can monitor data without the upper layers of the OSI model being aware of it.
Sniffers can monitor data without the upper layers of the OSI model being aware of it.
Lawful interception can be performed without a warrant in most countries.
Lawful interception can be performed without a warrant in most countries.
Active wiretapping involves monitoring and altering traffic.
Active wiretapping involves monitoring and altering traffic.
HTTP is a protocol that transmits data securely by encrypting it.
HTTP is a protocol that transmits data securely by encrypting it.
A hardware protocol analyzer can only be used to capture signals without altering the traffic.
A hardware protocol analyzer can only be used to capture signals without altering the traffic.
Passive wiretapping allows an attacker to inject false information into the communication.
Passive wiretapping allows an attacker to inject false information into the communication.
Telnet is a protocol that securely transmits sensitive data.
Telnet is a protocol that securely transmits sensitive data.
Wireless networks can also be susceptible to wiretapping.
Wireless networks can also be susceptible to wiretapping.
A hardware protocol analyzer can identify malicious network traffic generated by hacking software.
A hardware protocol analyzer can identify malicious network traffic generated by hacking software.
POP3 and IMAP are examples of protocols that can be compromised due to clear text transmission.
POP3 and IMAP are examples of protocols that can be compromised due to clear text transmission.
Which of the following accurately describes a feature of Wireshark?
Which of the following accurately describes a feature of Wireshark?
Which method is NOT recommended to defend against network sniffing?
Which method is NOT recommended to defend against network sniffing?
What is a major characteristic of DNS cache poisoning?
What is a major characteristic of DNS cache poisoning?
How can sniffing be detected on a network?
How can sniffing be detected on a network?
What is the primary difference between passive sniffing and active sniffing in a network environment?
What is the primary difference between passive sniffing and active sniffing in a network environment?
In the context of network sniffing, which technique specifically targets the Content Addressable Memory (CAM) of a switch?
In the context of network sniffing, which technique specifically targets the Content Addressable Memory (CAM) of a switch?
Which of the following explains how an attacker can successfully extract sensitive data using sniffers?
Which of the following explains how an attacker can successfully extract sensitive data using sniffers?
What characteristic makes passive sniffing less detectable compared to active sniffing?
What characteristic makes passive sniffing less detectable compared to active sniffing?
Which of the following types of sensitive information could potentially be captured through sniffing that relates to user authentication processes?
Which of the following types of sensitive information could potentially be captured through sniffing that relates to user authentication processes?
What best describes the primary capability of a hardware protocol analyzer?
What best describes the primary capability of a hardware protocol analyzer?
Which type of wiretapping involves modifying the data being intercepted?
Which type of wiretapping involves modifying the data being intercepted?
Which layer of the OSI model do sniffers primarily interact with when capturing data?
Which layer of the OSI model do sniffers primarily interact with when capturing data?
What is a commonly used method by attackers during passive wiretapping?
What is a commonly used method by attackers during passive wiretapping?
Which of the following is NOT a feature of lawful interception?
Which of the following is NOT a feature of lawful interception?
Which component is essential for any wiretapping process to be considered lawful?
Which component is essential for any wiretapping process to be considered lawful?
Which of the following protocols is susceptible to sniffing and transmits data in clear text?
Which of the following protocols is susceptible to sniffing and transmits data in clear text?
What is the consequence of employing a hardware protocol analyzer in a network?
What is the consequence of employing a hardware protocol analyzer in a network?
What characterizes the process of sniffing in the context of network security?
What characterizes the process of sniffing in the context of network security?
Which hardware protocol analyzer is identified for its capability to monitor network usage?
Which hardware protocol analyzer is identified for its capability to monitor network usage?
Passive sniffing can capture all traffic on a switch-based network without injecting any packets.
Passive sniffing can capture all traffic on a switch-based network without injecting any packets.
DNS poisoning is a technique that tricks a DNS server into believing that it has received fraudulent information.
DNS poisoning is a technique that tricks a DNS server into believing that it has received fraudulent information.
In active sniffing, an attacker collects traffic by flooding the switch's CAM table with address resolution packets.
In active sniffing, an attacker collects traffic by flooding the switch's CAM table with address resolution packets.
Wireshark captures packets from Bluetooth and ADSL networks but not from Ethernet networks.
Wireshark captures packets from Bluetooth and ADSL networks but not from Ethernet networks.
The primary advantage of using a hub in a network is to provide higher data security compared to switches.
The primary advantage of using a hub in a network is to provide higher data security compared to switches.
Using a hub instead of a switch is recommended for secure communication since hubs deliver data only to the intended recipient.
Using a hub instead of a switch is recommended for secure communication since hubs deliver data only to the intended recipient.
The DNS cache poisoning technique allows an attacker to replace IP address entries for a target site with an IP address controlled by the attacker.
The DNS cache poisoning technique allows an attacker to replace IP address entries for a target site with an IP address controlled by the attacker.
DNS poisoning is a passive technique that does not interfere with network traffic flow.
DNS poisoning is a passive technique that does not interfere with network traffic flow.
Sniffing allows attackers to capture sensitive information like Telnet passwords and email traffic.
Sniffing allows attackers to capture sensitive information like Telnet passwords and email traffic.
Retrieving the MAC address directly from the operating system instead of the NIC prevents MAC address spoofing.
Retrieving the MAC address directly from the operating system instead of the NIC prevents MAC address spoofing.
Wired equipment cannot be used to monitor network traffic due to the high speed of the data flow.
Wired equipment cannot be used to monitor network traffic due to the high speed of the data flow.
Passive wiretapping can change the content of the communications being monitored.
Passive wiretapping can change the content of the communications being monitored.
The Data Link layer of the OSI model operates independently and can be accessed by sniffers without affecting higher layers.
The Data Link layer of the OSI model operates independently and can be accessed by sniffers without affecting higher layers.
Lawful interception is a method used by law enforcement to avoid any legal consequences while intercepting data communications.
Lawful interception is a method used by law enforcement to avoid any legal consequences while intercepting data communications.
Active wiretapping involves simply monitoring the data without interacting with it.
Active wiretapping involves simply monitoring the data without interacting with it.
Keysight N2X N5540A is an example of a hardware protocol analyzer used for monitoring network usage.
Keysight N2X N5540A is an example of a hardware protocol analyzer used for monitoring network usage.
SMTP is known to transmit data securely without risks of sniffing.
SMTP is known to transmit data securely without risks of sniffing.
A hardware protocol analyzer modifies data packets for better analysis of network traffic.
A hardware protocol analyzer modifies data packets for better analysis of network traffic.
Telnet and FTP are protocols known to transmit data including usernames and passwords in clear text.
Telnet and FTP are protocols known to transmit data including usernames and passwords in clear text.
Wiring devices can be utilized for both active and passive wiretapping methods.
Wiring devices can be utilized for both active and passive wiretapping methods.
Flashcards
MAC Address Spoofing (Attack)
MAC Address Spoofing (Attack)
An attack where an attacker gets the MAC address of a user, to impersonate them by sending them fake data via the same switch port.
DNS Poisoning
DNS Poisoning
A technique to trick a DNS server into believing false information, redirecting users to malicious sites by giving a fake IP address.
Wireshark
Wireshark
A network sniffing tool used to capture and analyze network traffic.
HTTPS
HTTPS
Signup and view all the flashcards
Promiscuous Mode
Promiscuous Mode
Signup and view all the flashcards
Network Sniffing
Network Sniffing
Signup and view all the flashcards
Switch vs. Hub
Switch vs. Hub
Signup and view all the flashcards
DNS Spoofing Technique
DNS Spoofing Technique
Signup and view all the flashcards
Passive Sniffing
Passive Sniffing
Signup and view all the flashcards
Active Sniffing
Active Sniffing
Signup and view all the flashcards
Sniffer Tools
Sniffer Tools
Signup and view all the flashcards
MAC Flooding
MAC Flooding
Signup and view all the flashcards
Hub
Hub
Signup and view all the flashcards
Switch
Switch
Signup and view all the flashcards
Sniffing at the Data Link Layer
Sniffing at the Data Link Layer
Signup and view all the flashcards
Sniffing vulnerable protocols
Sniffing vulnerable protocols
Signup and view all the flashcards
Hardware Protocol Analyzer
Hardware Protocol Analyzer
Signup and view all the flashcards
Wiretapping
Wiretapping
Signup and view all the flashcards
Active Wiretapping
Active Wiretapping
Signup and view all the flashcards
Passive Wiretapping
Passive Wiretapping
Signup and view all the flashcards
Lawful interception
Lawful interception
Signup and view all the flashcards
Unsecured Protocols (Sniffing Vulnerability)
Unsecured Protocols (Sniffing Vulnerability)
Signup and view all the flashcards
Wiretap
Wiretap
Signup and view all the flashcards
Access Switch/Tap
Access Switch/Tap
Signup and view all the flashcards
Central Management Server (CMS)
Central Management Server (CMS)
Signup and view all the flashcards
Port Security
Port Security
Signup and view all the flashcards
ARP (Address Resolution Protocol)
ARP (Address Resolution Protocol)
Signup and view all the flashcards
ARP Request
ARP Request
Signup and view all the flashcards
ARP Table
ARP Table
Signup and view all the flashcards
ARP Spoofing
ARP Spoofing
Signup and view all the flashcards
What is a forged ARP packet?
What is a forged ARP packet?
Signup and view all the flashcards
MAC Spoofing/Duplicating
MAC Spoofing/Duplicating
Signup and view all the flashcards
What are the threats of ARP Poisoning?
What are the threats of ARP Poisoning?
Signup and view all the flashcards
Switch's Forwarding Mode
Switch's Forwarding Mode
Signup and view all the flashcards
What is the goal of MAC Spoofing?
What is the goal of MAC Spoofing?
Signup and view all the flashcards
How does MAC Duplication work?
How does MAC Duplication work?
Signup and view all the flashcards
MAC Address Spoofing
MAC Address Spoofing
Signup and view all the flashcards
Wireshark Tool
Wireshark Tool
Signup and view all the flashcards
What is network sniffing?
What is network sniffing?
Signup and view all the flashcards
Why is sniffing dangerous?
Why is sniffing dangerous?
Signup and view all the flashcards
What is passive sniffing?
What is passive sniffing?
Signup and view all the flashcards
What is active sniffing?
What is active sniffing?
Signup and view all the flashcards
What is MAC Flooding?
What is MAC Flooding?
Signup and view all the flashcards
What is sniffing?
What is sniffing?
Signup and view all the flashcards
Data Link Layer Sniffing
Data Link Layer Sniffing
Signup and view all the flashcards
Vulnerable Protocols
Vulnerable Protocols
Signup and view all the flashcards
What is wiretapping?
What is wiretapping?
Signup and view all the flashcards
Compromised Application Stream
Compromised Application Stream
Signup and view all the flashcards
Initial Compromise
Initial Compromise
Signup and view all the flashcards
Intranet DNS Spoofing
Intranet DNS Spoofing
Signup and view all the flashcards
Sniffing
Sniffing
Signup and view all the flashcards
What does a Hardware Protocol Analyzer do?
What does a Hardware Protocol Analyzer do?
Signup and view all the flashcards
What is Passive Wiretapping?
What is Passive Wiretapping?
Signup and view all the flashcards
What is the purpose of Lawful Interception?
What is the purpose of Lawful Interception?
Signup and view all the flashcards
What is a Compromised Application Stream?
What is a Compromised Application Stream?
Signup and view all the flashcards
How can a Physical Link be Compromised?
How can a Physical Link be Compromised?
Signup and view all the flashcards
What does a Sniffer do?
What does a Sniffer do?
Signup and view all the flashcards
What is Initial Compromise?
What is Initial Compromise?
Signup and view all the flashcards
Physical Link Compromise
Physical Link Compromise
Signup and view all the flashcards
Vulnerable Protocols (Sniffing)
Vulnerable Protocols (Sniffing)
Signup and view all the flashcards
Study Notes
Sniffing Module 07
- Sniffing is a process of monitoring and capturing data packets on a network.
- Sniffing tools are used for wiretapping on computer networks.
- Switch ports can be open, which allows anyone in the same physical location to plug into the network using an Ethernet cable.
- Often, sensitive information is obtained through sniffing, including syslog traffic, telnet passwords, router configurations, and FTP passwords.
- Sensitive information acquired through sniffing includes web traffic, chat sessions, email, and DNS traffic.
How a Sniffer Works
- A sniffer turns the Network Interface Card (NIC) of a system to promiscuous mode.
- This mode allows the sniffer to listen to all the transmitted data on its segment.
- An attacker might make a switch behave as a hub, allowing a sniffer to capture traffic meant for other devices.
- A sniffer monitors network traffic by decoding the information encapsulated in data packets.
Passive Sniffing
- Passive sniffing involves monitoring traffic without actively injecting data into the network.
- It’s done through a hub, where all traffic is sent to all ports.
- Hubs are now outdated; most modern networks use switches.
- All hosts in a hub-based network can see all traffic, making sniffing easier.
- Passive sniffing offers significant stealth compared to active sniffing.
Active Sniffing
- Active sniffing involves injecting packets into a switch-based network to obtain information.
- Attackers use techniques like ARP flooding and DNS poisoning.
- ARP flooding, DNS poisoning, switch port stealing, and spoofing attacks are examples that are used to acquire data in an active sniffing manner.
- A target computer's ARP cache is flooded with forged entries in an Active Sniffing attack.
How an Attacker Hacks via Sniffers
- Attackers often use laptop devices connected to a switch port.
- Discovery tools help identify network topology.
- Targeting specific machines leads to targeted attacks.
- ARP spoofing redirects traffic to the attacker.
- Passwords and sensitive data are retrieved from redirected traffic.
Protocols Vulnerable to Sniffing
- Protocols that send data in clear text are vulnerable.
- This includes HTTP, Telnet, Rlogin, POP, IMAP, SMTP, NNTP, and FTP.
- Keystrokes, usernames, and passwords are also susceptible.
Sniffing in the Data Link Layer (OSI Model)
- Sniffers operate at the Data Link layer of the OSI model.
- The Data Link layer operates independently of higher layers.
- Network traffic is easily sniffed since the upper OSI layers are unaware of the action.
Hardware Protocol Analyzers
- Hardware protocol analyzers are devices that capture network traffic without altering it.
- They can monitor network usage and identify malicious activity.
- Individual data bytes of each packet are visible using the analyzer.
- Various examples of hardware protocol analyzers are listed, including Keysight N2X N5540A, Keysight E2960B, RADCOM PrismLite Protocol Analyzer, RADCOM Prism Ultra-Lite Protocol Analyzer, FLUKE Networks, and OptiView XG.
Wiretapping
- Wiretapping involves monitoring communications (phone, internet) by a third party.
- It can use hardware, software, or a combination of both.
- It allows attackers to monitor, intercept, access, and record information in a communication system.
- Active wiretapping involves altering the communications.
- Passive wiretapping involves passively monitoring.
Lawful Interception
- Lawful interception is legally intercepting data communication for surveillance.
- This requires court orders and specific procedures.
- Agencies like law enforcement and intelligence agencies can access this data when required.
Wiretapping Case Study: PRISM
- PRISM is a data collection tool designed to collect and process foreign intelligence.
- Significant amounts of foreign internet traffic are routed through US servers.
- Wiretapping helps to intercept and collect the data of foreign users.
MAC Flooding
- MAC flooding involves overwhelming the CAM table of a switch with fake MAC addresses and IP.
- This causes the switch to act as a hub by broadcasting traffic to all devices on the network.
- The attacker can then sniffer traffic.
- Flood of MAC addresses causes the switch to enter forwarding mode
ARP Spoofing Attacks
- Forged ARP packets send traffic to the attacker.
- This floods the switch by sending ARP-request and ARP-reply.
- ARP table is poisoned with incorrect entries, which deflect the traffic to the attacker.
Threats of ARP Poisoning
- Diverting communications between two machines through fake ARP messages.
- Packet sniffing, session hijacking, VoIP call tapping, data manipulation, Man-in-the-Middle attacks, and Denial-of-Service (DoS) attacks are types of harms from ARP Poisoning.
MAC Spoofing/Duplication
- MAC spoofing involves actively changing or mimicking a MAC address to gain access to the network.
- Network traffic intended for the legitimate user is intercepted and routed to the spoofer.
- By listening to traffic on the network, malicious users can use legitimate user MAC addresses to receive traffic.
DNS Poisoning Techniques
- DNS poisoning tricks a DNS server into accepting fake IP address information for a domain, leading to malicious links or other exploits.
- An attacker can alter the IP address (at the DNS-server level) displayed by the server to the victims' computers; this often occurs through replacing the true IP with an illegitimate IP.
Sniffing Tool: Wireshark
- Wireshark is a commonly used network traffic capturing and analyzing tool.
- It supports various network types, including Ethernet, and Token-Ring.
- Wireshark uses WinPcap and allows for editing of captures using command-line.
- Filters allow users to quickly identify specific packets.
How to Defend Against Sniffing
- Use HTTPS instead of HTTP to secure sensitive information.
- Use switches where appropriate, rather than hubs, to prevent all packets from being sent to all devices.
- Use methods like SFTP instead of FTP to securely transfer files.
- Encrypt network communications with strong protocols (e.g., WPA2).
- Retrieve MAC addresses from the network interface card (NIC) for security.
- Use tools to monitor network interfaces for malicious promiscuous mode use.
How to Detect Sniffing
- Check for devices operating in promiscuous mode.
- Use Intrusion Detection Systems (IDS) to detect changes in MAC addresses.
- Use network tools to monitor and identify unusual packets, as well.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.