Sniffing Module 07 Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which protocol is known to transmit data in clear text?

  • SSH
  • HTTPS
  • FTP (correct)
  • SSL

At which layer of the OSI model do sniffers operate?

  • Application layer
  • Network layer
  • Data Link layer (correct)
  • Transport layer

What defines active wiretapping?

  • Captures data without affecting it
  • Only monitors and records traffic
  • Intercepts data without altering it
  • Injects data into the communication (correct)

What is the primary function of a hardware protocol analyzer?

<p>To capture signals and monitor usage (A)</p> Signup and view all the answers

What does lawful interception involve?

<p>Legally intercepting communications (B)</p> Signup and view all the answers

Which of the following is a characteristic of passive wiretapping?

<p>Records and monitors the traffic (B)</p> Signup and view all the answers

Which of these protocols is NOT considered compromised regarding sniffing?

<p>SSH (C)</p> Signup and view all the answers

What is the main purpose of wiretapping?

<p>To secretly monitor conversations (B)</p> Signup and view all the answers

What technique does DNS poisoning utilize to mislead a DNS server?

<p>Replacing legitimate IP addresses with false ones (D)</p> Signup and view all the answers

Which of the following is a recommended way to defend against network sniffing?

<p>Utilize switches rather than hubs (D)</p> Signup and view all the answers

Which method can be used to capture and analyze network traffic?

<p>Wireshark (B)</p> Signup and view all the answers

What is one way an attacker can utilize MAC addresses to perform attacks?

<p>By pretending to be associated users linked to a switch port (B)</p> Signup and view all the answers

Which protocol should be used instead of FTP for secure file transfers?

<p>SFTP (B)</p> Signup and view all the answers

Which of the following attacks involves manipulating the cache of a DNS server?

<p>DNS Cache Poisoning (B)</p> Signup and view all the answers

What type of network traffic does Wireshark capture?

<p>Various types including Ethernet and Bluetooth (C)</p> Signup and view all the answers

How can one detect if any network interfaces are running in promiscuous mode?

<p>By running diagnostic tools to check NIC settings (D)</p> Signup and view all the answers

What is the purpose of an ARP request?

<p>To obtain the MAC address corresponding to an IP address. (D)</p> Signup and view all the answers

Which of the following describes ARP poisoning?

<p>Flooding a target computer's ARP cache with forged entries. (B)</p> Signup and view all the answers

What threat involves diverting communications between two machines through an attacker's PC?

<p>Man-in-the-Middle Attack (A)</p> Signup and view all the answers

How can a MAC duplicating attack be executed?

<p>By sniffing the network for active MAC addresses. (B)</p> Signup and view all the answers

What is the primary function of a sniffer in a network?

<p>To monitor and capture data packets (D)</p> Signup and view all the answers

Which type of sniffing involves monitoring packets without injecting any additional traffic?

<p>Passive Sniffing (D)</p> Signup and view all the answers

What happens after ARP requests and replies flood a switch?

<p>The switch forwards all traffic to the attacker. (D)</p> Signup and view all the answers

What happens during active sniffing in a switch-based network?

<p>Additional data packets are injected into the network (D)</p> Signup and view all the answers

Which of the following is NOT a threat associated with ARP poisoning?

<p>Increased bandwidth usage (A)</p> Signup and view all the answers

What technique can an attacker use in active sniffing to redirect traffic from the victim's machine?

<p>ARP Spoofing (B)</p> Signup and view all the answers

What is a common method used by attackers in ARP spoofing?

<p>Constructing forged ARP requests and replies. (A)</p> Signup and view all the answers

What does a switch do in 'forwarding mode'?

<p>It forwards packets based on MAC addresses. (C)</p> Signup and view all the answers

What type of traffic can potentially be captured by sniffers?

<p>All types of network traffic (C)</p> Signup and view all the answers

In a hub-based network, what advantage does passive sniffing provide?

<p>Significant stealth advantages (A)</p> Signup and view all the answers

What is a possible effect of MAC flooding in a network?

<p>Flooding the CAM table (C)</p> Signup and view all the answers

What is the first step an attacker takes when using sniffers to hack a network?

<p>Connect to a switch port (C)</p> Signup and view all the answers

What is the primary function of the PRISM tool?

<p>To collect and process foreign intelligence data. (D)</p> Signup and view all the answers

Which of the following describes MAC flooding?

<p>Flooding the CAM table with fake MAC address and IP pairs. (B)</p> Signup and view all the answers

What is one of the key defenses against MAC flooding attacks?

<p>Implementing port security to allow only one MAC address. (C)</p> Signup and view all the answers

What does Address Resolution Protocol (ARP) primarily do?

<p>Resolves IP addresses to MAC addresses. (B)</p> Signup and view all the answers

What data flow speed is reported for Europe in the context of wiretap rates?

<p>5 Gbps (A)</p> Signup and view all the answers

Which component allows law enforcement to access intercepted data?

<p>Storage System. (A)</p> Signup and view all the answers

Which of the following is NOT part of the recommended port security configuration?

<p>switchport port-security disable all ports (C)</p> Signup and view all the answers

Which area has the highest data flow in hours related to wiretapping?

<p>Latin America and Caribbean. (D)</p> Signup and view all the answers

DNS poisoning tricks a DNS server into believing it has received authentic information.

<p>True (A)</p> Signup and view all the answers

Wireshark captures packets only on the networks supported by Ethernet.

<p>False (B)</p> Signup and view all the answers

Using a switch instead of a hub can help protect data by delivering it only to the intended recipient.

<p>True (A)</p> Signup and view all the answers

A common method for attackers to carry out a DNS attack is by creating fake DNS entries with the same name as legitimate servers.

<p>True (A)</p> Signup and view all the answers

Retrieving the MAC address directly from the OS is recommended to prevent MAC address spoofing.

<p>False (B)</p> Signup and view all the answers

Sniffing is a method used to capture and monitor data packets in a network.

<p>True (A)</p> Signup and view all the answers

Active sniffing requires the use of switches to be effective, while passive sniffing does not.

<p>True (A)</p> Signup and view all the answers

In passive sniffing, the attacker can send data packets into the network traffic.

<p>False (B)</p> Signup and view all the answers

MAC flooding is an example of an active sniffing technique.

<p>True (A)</p> Signup and view all the answers

A sniffer can be used to turn a standard NIC into promiscuous mode to listen to all transmitted data.

<p>True (A)</p> Signup and view all the answers

Sniffers operate at the Network layer of the OSI model.

<p>False (B)</p> Signup and view all the answers

Active wiretapping involves only monitoring and recording traffic.

<p>False (B)</p> Signup and view all the answers

A hardware protocol analyzer can capture and analyze individual data bytes passing through a cable.

<p>True (A)</p> Signup and view all the answers

Lawful interception requires consent from one of the involved parties.

<p>True (A)</p> Signup and view all the answers

All data sent via FTP is encrypted by default.

<p>False (B)</p> Signup and view all the answers

Passive wiretapping is considered a criminal offense in all circumstances.

<p>False (B)</p> Signup and view all the answers

IMAP is a protocol known for sending passwords in clear text.

<p>True (A)</p> Signup and view all the answers

A compromised protocol guarantees secure data transmission.

<p>False (B)</p> Signup and view all the answers

Sniffers can operate independently of the upper layers and remain undetected.

<p>True (A)</p> Signup and view all the answers

Telephone conversations can be monitored through wiretapping.

<p>True (A)</p> Signup and view all the answers

What is the primary consequence of DNS poisoning?

<p>Manipulation of a DNS server's IP address records (A)</p> Signup and view all the answers

How does Wireshark primarily capture network traffic?

<p>Using Winpcap to capture packets on supported networks (C)</p> Signup and view all the answers

Which method is effective in preventing MAC address spoofing?

<p>Getting the MAC directly from the NIC instead of the OS (C)</p> Signup and view all the answers

What is the purpose of using a switch instead of a hub in network configuration?

<p>To reduce latency by isolating traffic to specific ports (D)</p> Signup and view all the answers

Which technique can be employed to recognize if a machine is in promiscuous mode?

<p>Utilizing specific tools to check NIC configurations (D)</p> Signup and view all the answers

What is the primary difference between passive and active sniffing in a network?

<p>Active sniffing requires manipulation of the network traffic. (D)</p> Signup and view all the answers

Which technique allows an attacker to redirect traffic using ARP spoofing?

<p>Flooding a switch's CAM table with ARP packets. (D)</p> Signup and view all the answers

What makes passive sniffing more advantageous than active sniffing?

<p>It is less likely to be detected. (C)</p> Signup and view all the answers

Which kind of network equipment primarily exposes vulnerabilities to sniffing attacks?

<p>Hubs that broadcast traffic to all ports. (C)</p> Signup and view all the answers

What does MAC flooding aim to achieve in terms of network security?

<p>To force a switch to behave like a hub. (A)</p> Signup and view all the answers

Which of the following statements is true regarding active wiretapping?

<p>It allows for intercepting and altering data traffic. (D)</p> Signup and view all the answers

What is a primary function of hardware protocol analyzers?

<p>To capture and analyze traffic without modification. (C)</p> Signup and view all the answers

Which protocol is typically associated with transmitting data in clear text?

<p>SMTP (C)</p> Signup and view all the answers

What does passive wiretapping primarily allow an attacker to do?

<p>Monitor and record traffic. (A)</p> Signup and view all the answers

Which of the following could be considered a limitation of sniffers at the Data Link layer?

<p>They are unable to capture all traffic types. (D)</p> Signup and view all the answers

What distinguishes lawful interception from other types of data interception?

<p>It requires user consent. (D)</p> Signup and view all the answers

What is a common tool for monitoring network usage and identifying malicious traffic?

<p>Hardware protocol analyzer (C)</p> Signup and view all the answers

Which of the following protocols is vulnerable to sniffing due to transmitting data in clear text?

<p>FTP (C)</p> Signup and view all the answers

What technique is primarily used to monitor and capture telephone conversations by unauthorized parties?

<p>Wiretapping (D)</p> Signup and view all the answers

Which of the following statements is true regarding sniffing tools?

<p>They can provide real-time monitoring of network traffic. (A)</p> Signup and view all the answers

DNS poisoning results in the replacement of a true IP address with a false one at the DNS level.

<p>True (A)</p> Signup and view all the answers

Wireshark can capture packets from all network types without any limitations.

<p>False (B)</p> Signup and view all the answers

Using HTTPS instead of HTTP is a recommended approach to protect sensitive data during transmission.

<p>True (A)</p> Signup and view all the answers

Creating fake DNS entries is not a technique used in DNS attacks.

<p>False (B)</p> Signup and view all the answers

Retrieving the MAC address from the operating system helps in preventing MAC address spoofing.

<p>False (B)</p> Signup and view all the answers

Active sniffing involves monitoring packets without injecting additional data into the network traffic.

<p>False (B)</p> Signup and view all the answers

Passive sniffing can capture all traffic in a hub-based network because the hub sends traffic to all ports.

<p>True (A)</p> Signup and view all the answers

A common active sniffing technique is DHCP attacks, which can lead to network disruption and data theft.

<p>True (A)</p> Signup and view all the answers

MAC flooding can cause a switch to behave like a hub, exposing data to all connected devices.

<p>True (A)</p> Signup and view all the answers

Sniffing tools can only capture unencrypted data, making them ineffective against secure communications.

<p>False (B)</p> Signup and view all the answers

Sniffers can monitor data without the upper layers of the OSI model being aware of it.

<p>True (A)</p> Signup and view all the answers

Lawful interception can be performed without a warrant in most countries.

<p>False (B)</p> Signup and view all the answers

Active wiretapping involves monitoring and altering traffic.

<p>True (A)</p> Signup and view all the answers

HTTP is a protocol that transmits data securely by encrypting it.

<p>False (B)</p> Signup and view all the answers

A hardware protocol analyzer can only be used to capture signals without altering the traffic.

<p>True (A)</p> Signup and view all the answers

Passive wiretapping allows an attacker to inject false information into the communication.

<p>False (B)</p> Signup and view all the answers

Telnet is a protocol that securely transmits sensitive data.

<p>False (B)</p> Signup and view all the answers

Wireless networks can also be susceptible to wiretapping.

<p>True (A)</p> Signup and view all the answers

A hardware protocol analyzer can identify malicious network traffic generated by hacking software.

<p>True (A)</p> Signup and view all the answers

POP3 and IMAP are examples of protocols that can be compromised due to clear text transmission.

<p>True (A)</p> Signup and view all the answers

Which of the following accurately describes a feature of Wireshark?

<p>It relies on Winpcap for capturing network packets (C)</p> Signup and view all the answers

Which method is NOT recommended to defend against network sniffing?

<p>Employing a hub for easier traffic monitoring (C)</p> Signup and view all the answers

What is a major characteristic of DNS cache poisoning?

<p>It can occur through insecure DNS configurations (A)</p> Signup and view all the answers

How can sniffing be detected on a network?

<p>By checking if any machines are running in promiscuous mode (B)</p> Signup and view all the answers

What is the primary difference between passive sniffing and active sniffing in a network environment?

<p>Passive sniffing involves monitoring without injecting data, while active sniffing involves injecting data into the network. (D)</p> Signup and view all the answers

In the context of network sniffing, which technique specifically targets the Content Addressable Memory (CAM) of a switch?

<p>MAC flooding (C)</p> Signup and view all the answers

Which of the following explains how an attacker can successfully extract sensitive data using sniffers?

<p>By redirecting traffic meant for the victim through their own machine. (A)</p> Signup and view all the answers

What characteristic makes passive sniffing less detectable compared to active sniffing?

<p>It only observes existing traffic without injecting any packets. (B)</p> Signup and view all the answers

Which of the following types of sensitive information could potentially be captured through sniffing that relates to user authentication processes?

<p>Telnet passwords (B)</p> Signup and view all the answers

What best describes the primary capability of a hardware protocol analyzer?

<p>To capture and analyze data packets according to predetermined rules. (D)</p> Signup and view all the answers

Which type of wiretapping involves modifying the data being intercepted?

<p>Active Wiretapping (A)</p> Signup and view all the answers

Which layer of the OSI model do sniffers primarily interact with when capturing data?

<p>Data Link Layer (C)</p> Signup and view all the answers

What is a commonly used method by attackers during passive wiretapping?

<p>Monitoring and recording the data without interference. (D)</p> Signup and view all the answers

Which of the following is NOT a feature of lawful interception?

<p>Monitoring without consent. (C)</p> Signup and view all the answers

Which component is essential for any wiretapping process to be considered lawful?

<p>Legal warrant or consent. (B)</p> Signup and view all the answers

Which of the following protocols is susceptible to sniffing and transmits data in clear text?

<p>POP (A)</p> Signup and view all the answers

What is the consequence of employing a hardware protocol analyzer in a network?

<p>Potential privacy concerns if used without permission. (C)</p> Signup and view all the answers

What characterizes the process of sniffing in the context of network security?

<p>Capturing data packets without altering their content. (D)</p> Signup and view all the answers

Which hardware protocol analyzer is identified for its capability to monitor network usage?

<p>FLUKE Networks OptiView® XG (A)</p> Signup and view all the answers

Passive sniffing can capture all traffic on a switch-based network without injecting any packets.

<p>False (B)</p> Signup and view all the answers

DNS poisoning is a technique that tricks a DNS server into believing that it has received fraudulent information.

<p>True (A)</p> Signup and view all the answers

In active sniffing, an attacker collects traffic by flooding the switch's CAM table with address resolution packets.

<p>True (A)</p> Signup and view all the answers

Wireshark captures packets from Bluetooth and ADSL networks but not from Ethernet networks.

<p>False (B)</p> Signup and view all the answers

The primary advantage of using a hub in a network is to provide higher data security compared to switches.

<p>False (B)</p> Signup and view all the answers

Using a hub instead of a switch is recommended for secure communication since hubs deliver data only to the intended recipient.

<p>False (B)</p> Signup and view all the answers

The DNS cache poisoning technique allows an attacker to replace IP address entries for a target site with an IP address controlled by the attacker.

<p>True (A)</p> Signup and view all the answers

DNS poisoning is a passive technique that does not interfere with network traffic flow.

<p>False (B)</p> Signup and view all the answers

Sniffing allows attackers to capture sensitive information like Telnet passwords and email traffic.

<p>True (A)</p> Signup and view all the answers

Retrieving the MAC address directly from the operating system instead of the NIC prevents MAC address spoofing.

<p>False (B)</p> Signup and view all the answers

Wired equipment cannot be used to monitor network traffic due to the high speed of the data flow.

<p>False (B)</p> Signup and view all the answers

Passive wiretapping can change the content of the communications being monitored.

<p>False (B)</p> Signup and view all the answers

The Data Link layer of the OSI model operates independently and can be accessed by sniffers without affecting higher layers.

<p>True (A)</p> Signup and view all the answers

Lawful interception is a method used by law enforcement to avoid any legal consequences while intercepting data communications.

<p>True (A)</p> Signup and view all the answers

Active wiretapping involves simply monitoring the data without interacting with it.

<p>False (B)</p> Signup and view all the answers

Keysight N2X N5540A is an example of a hardware protocol analyzer used for monitoring network usage.

<p>True (A)</p> Signup and view all the answers

SMTP is known to transmit data securely without risks of sniffing.

<p>False (B)</p> Signup and view all the answers

A hardware protocol analyzer modifies data packets for better analysis of network traffic.

<p>False (B)</p> Signup and view all the answers

Telnet and FTP are protocols known to transmit data including usernames and passwords in clear text.

<p>True (A)</p> Signup and view all the answers

Wiring devices can be utilized for both active and passive wiretapping methods.

<p>True (A)</p> Signup and view all the answers

Flashcards

MAC Address Spoofing (Attack)

An attack where an attacker gets the MAC address of a user, to impersonate them by sending them fake data via the same switch port.

DNS Poisoning

A technique to trick a DNS server into believing false information, redirecting users to malicious sites by giving a fake IP address.

Wireshark

A network sniffing tool used to capture and analyze network traffic.

HTTPS

A secure protocol for transferring data over the internet using encryption for user names and passwords.

Signup and view all the flashcards

Promiscuous Mode

A network interface card (NIC) setting that allows the card to receive all network traffic, not just the intended traffic.

Signup and view all the flashcards

Network Sniffing

Capturing and analyzing network traffic by a tool or person without the knowledge of the user who owns these data.

Signup and view all the flashcards

Switch vs. Hub

A switch directs data packets only to the intended recipient, while a hub broadcasts data to all devices on the network.

Signup and view all the flashcards

DNS Spoofing Technique

An attack that redirects users to a malicious website by changing DNS records to point to a fake IP address.

Signup and view all the flashcards

Passive Sniffing

Monitoring network traffic without sending any extra data.

Signup and view all the flashcards

Active Sniffing

Injecting packets to overwhelm the network for data gathering.

Signup and view all the flashcards

Sniffer Tools

Software used for network analysis/monitoring using sniffing technique.

Signup and view all the flashcards

MAC Flooding

Overloading the switch's table with MAC addresses, causing it to 'drop packets'.

Signup and view all the flashcards

Hub

Network device that broadcasts data to all connected devices.

Signup and view all the flashcards

Switch

A network device that directs data only to the intended recipient.

Signup and view all the flashcards

Sniffing at the Data Link Layer

Sniffers capture data packets at the Data Link layer of the OSI model, without upper layers being aware.

Signup and view all the flashcards

Sniffing vulnerable protocols

Some protocols like HTTP, Telnet, and POP transmit data in clear text, making them vulnerable to sniffing.

Signup and view all the flashcards

Hardware Protocol Analyzer

A device used to capture and analyze network traffic without altering it.

Signup and view all the flashcards

Wiretapping

Monitoring and intercepting communication (phone or internet) by listening devices.

Signup and view all the flashcards

Active Wiretapping

Wiretapping method that monitors, records, and potentially alters communication or injects elements.

Signup and view all the flashcards

Passive Wiretapping

Wiretapping method that only monitors and records communication, without altering it.

Signup and view all the flashcards

Lawful interception

Legally intercepting data communication for surveillance purposes (telecommunications, data, etc.).

Signup and view all the flashcards

Unsecured Protocols (Sniffing Vulnerability)

Protocols that transmit data (usernames, passwords) in clear text are susceptible to unauthorized access by intercepting the data.

Signup and view all the flashcards

Wiretap

A court order authorizing the interception of communications, like phone calls or internet traffic, for legal investigations.

Signup and view all the flashcards

Access Switch/Tap

A physical device installed by a service provider to allow law enforcement access to intercepted data.

Signup and view all the flashcards

Central Management Server (CMS)

A server that manages and controls the flow of intercepted data in a wiretapping system.

Signup and view all the flashcards

Port Security

A network security feature that restricts the number of MAC addresses allowed on a switch port, preventing MAC flooding attacks.

Signup and view all the flashcards

ARP (Address Resolution Protocol)

A network protocol that translates IP addresses (logical addresses) to MAC addresses (physical addresses) for devices on a network.

Signup and view all the flashcards

ARP Request

A broadcast message sent by a device on a network when it needs to find the MAC address associated with a specific IP address.

Signup and view all the flashcards

ARP Table

A table inside a network device that stores mappings between IP addresses and MAC addresses for recently communicated devices.

Signup and view all the flashcards

ARP Spoofing

An attack where attackers send forged ARP packets to a switch, flooding its ARP table with fake entries and diverting network traffic to their machines.

Signup and view all the flashcards

What is a forged ARP packet?

A fake ARP packet that claims to have a specific IP address, but contains a malicious MAC address, redirecting traffic to the attacker's machine.

Signup and view all the flashcards

MAC Spoofing/Duplicating

An attacker steals a legitimate user's MAC address by sniffing network traffic and reuses it to gain access to a network, impersonating the user.

Signup and view all the flashcards

What are the threats of ARP Poisoning?

ARP poisoning can lead to various attacks, including packet sniffing, session hijacking, data interception, and denial-of-service attacks.

Signup and view all the flashcards

Switch's Forwarding Mode

A switch operates in forwarding mode after its ARP table is flooded with forged ARP replies, allowing attackers to sniff all network packets.

Signup and view all the flashcards

What is the goal of MAC Spoofing?

A malicious user can intercept and use a legitimate user's MAC address to receive all the traffic destined for the user, gaining access to the network and potentially taking over their identity.

Signup and view all the flashcards

How does MAC Duplication work?

An attacker listens to network traffic, identifies a legitimate user's MAC address, and duplicates it to gain access to the network and impersonate the user.

Signup and view all the flashcards

MAC Address Spoofing

An attacker can deceive a network by using another device's MAC address to gain unauthorized access.

Signup and view all the flashcards

Wireshark Tool

A network analysis tool used to capture and inspect the traffic flowing through a network.

Signup and view all the flashcards

What is network sniffing?

Network sniffing is the act of capturing and analyzing data packets that travel across a network. It's like listening in on a conversation, but instead of words, you're listening to data packets.

Signup and view all the flashcards

Why is sniffing dangerous?

Sniffing can expose sensitive information like passwords, confidential files, and sensitive communication. It can be used to steal information or launch other attacks.

Signup and view all the flashcards

What is passive sniffing?

Passive sniffing involves listening to network traffic without sending any additional packets. It's like eavesdropping on a conversation without saying anything.

Signup and view all the flashcards

What is active sniffing?

Active sniffing is used to sniff a switch-based network. It involves injecting ARP packets to flood the switch's CAM table, allowing the attacker to capture all traffic.

Signup and view all the flashcards

What is MAC Flooding?

MAC flooding is an active sniffing technique where an attacker sends many fake MAC addresses to the switch, overwhelming its memory and causing it to behave like a hub.

Signup and view all the flashcards

What is sniffing?

Capturing and analyzing network traffic without the knowledge of the user who owns these data.

Signup and view all the flashcards

Data Link Layer Sniffing

Sniffers operate at the Data Link layer of the OSI model, capturing packets as they pass through the network.

Signup and view all the flashcards

Vulnerable Protocols

Protocols that send passwords and data in plain text, making the information vulnerable to sniffing.

Signup and view all the flashcards

What is wiretapping?

Monitoring and intercepting phone and internet conversations by connecting a listening device to the communication circuit.

Signup and view all the flashcards

Compromised Application Stream

Protocols like POP3, IMAP, IM, SSL, and SSH can be vulnerable to sniffing because they send sensitive data through the network.

Signup and view all the flashcards

Initial Compromise

Attackers can gain access to network traffic by physically connecting a sniffer to a network cable or by exploiting network vulnerabilities.

Signup and view all the flashcards

Intranet DNS Spoofing

A DNS poisoning attack within a local network. This means the attacker is on the same network as the victim and can target a DNS server within that network, redirecting internal traffic to the attacker's control.

Signup and view all the flashcards

Sniffing

Capturing and analyzing network traffic to gather information like passwords, communications, and data packets, often without the knowledge of the user.

Signup and view all the flashcards

What does a Hardware Protocol Analyzer do?

It captures network data without altering the traffic, allowing detailed analysis of packet contents, including individual bytes.

Signup and view all the flashcards

What is Passive Wiretapping?

It only monitors and records network traffic to gain knowledge of the data it contains. Attackers don't change the flow.

Signup and view all the flashcards

What is the purpose of Lawful Interception?

It allows authorized parties like law enforcement to legally intercept data communication for surveillance purposes on various networks.

Signup and view all the flashcards

What is a Compromised Application Stream?

Protocols like POP3, IMAP, IM, SSL, and SSH can be vulnerable to sniffing because they transmit sensitive data over the network.

Signup and view all the flashcards

How can a Physical Link be Compromised?

Attackers can physically connect a sniffer to a network cable, giving them access to all data flowing through that cable.

Signup and view all the flashcards

What does a Sniffer do?

Sniffers capture and analyze network traffic to gather information such as passwords, communication, and data packets, often without user awareness.

Signup and view all the flashcards

What is Initial Compromise?

Attackers can gain access to network traffic through physical connections, exploiting vulnerabilities, or using social engineering.

Signup and view all the flashcards

Physical Link Compromise

Attackers can physically connect a sniffer to a network cable, giving them access to all data flowing through that cable.

Signup and view all the flashcards

Vulnerable Protocols (Sniffing)

Protocols like HTTP, Telnet, and POP transmit data in clear text, making the information vulnerable to unauthorized access via sniffing.

Signup and view all the flashcards

Study Notes

Sniffing Module 07

  • Sniffing is a process of monitoring and capturing data packets on a network.
  • Sniffing tools are used for wiretapping on computer networks.
  • Switch ports can be open, which allows anyone in the same physical location to plug into the network using an Ethernet cable.
  • Often, sensitive information is obtained through sniffing, including syslog traffic, telnet passwords, router configurations, and FTP passwords.
  • Sensitive information acquired through sniffing includes web traffic, chat sessions, email, and DNS traffic.

How a Sniffer Works

  • A sniffer turns the Network Interface Card (NIC) of a system to promiscuous mode.
  • This mode allows the sniffer to listen to all the transmitted data on its segment.
  • An attacker might make a switch behave as a hub, allowing a sniffer to capture traffic meant for other devices.
  • A sniffer monitors network traffic by decoding the information encapsulated in data packets.

Passive Sniffing

  • Passive sniffing involves monitoring traffic without actively injecting data into the network.
  • It’s done through a hub, where all traffic is sent to all ports.
  • Hubs are now outdated; most modern networks use switches.
  • All hosts in a hub-based network can see all traffic, making sniffing easier.
  • Passive sniffing offers significant stealth compared to active sniffing.

Active Sniffing

  • Active sniffing involves injecting packets into a switch-based network to obtain information.
  • Attackers use techniques like ARP flooding and DNS poisoning.
  • ARP flooding, DNS poisoning, switch port stealing, and spoofing attacks are examples that are used to acquire data in an active sniffing manner.
  • A target computer's ARP cache is flooded with forged entries in an Active Sniffing attack.

How an Attacker Hacks via Sniffers

  • Attackers often use laptop devices connected to a switch port.
  • Discovery tools help identify network topology.
  • Targeting specific machines leads to targeted attacks.
  • ARP spoofing redirects traffic to the attacker.
  • Passwords and sensitive data are retrieved from redirected traffic.

Protocols Vulnerable to Sniffing

  • Protocols that send data in clear text are vulnerable.
  • This includes HTTP, Telnet, Rlogin, POP, IMAP, SMTP, NNTP, and FTP.
  • Keystrokes, usernames, and passwords are also susceptible.
  • Sniffers operate at the Data Link layer of the OSI model.
  • The Data Link layer operates independently of higher layers.
  • Network traffic is easily sniffed since the upper OSI layers are unaware of the action.

Hardware Protocol Analyzers

  • Hardware protocol analyzers are devices that capture network traffic without altering it.
  • They can monitor network usage and identify malicious activity.
  • Individual data bytes of each packet are visible using the analyzer.
  • Various examples of hardware protocol analyzers are listed, including Keysight N2X N5540A, Keysight E2960B, RADCOM PrismLite Protocol Analyzer, RADCOM Prism Ultra-Lite Protocol Analyzer, FLUKE Networks, and OptiView XG.

Wiretapping

  • Wiretapping involves monitoring communications (phone, internet) by a third party.
  • It can use hardware, software, or a combination of both.
  • It allows attackers to monitor, intercept, access, and record information in a communication system.
  • Active wiretapping involves altering the communications.
  • Passive wiretapping involves passively monitoring.

Lawful Interception

  • Lawful interception is legally intercepting data communication for surveillance.
  • This requires court orders and specific procedures.
  • Agencies like law enforcement and intelligence agencies can access this data when required.

Wiretapping Case Study: PRISM

  • PRISM is a data collection tool designed to collect and process foreign intelligence.
  • Significant amounts of foreign internet traffic are routed through US servers.
  • Wiretapping helps to intercept and collect the data of foreign users.

MAC Flooding

  • MAC flooding involves overwhelming the CAM table of a switch with fake MAC addresses and IP.
  • This causes the switch to act as a hub by broadcasting traffic to all devices on the network.
  • The attacker can then sniffer traffic.
  • Flood of MAC addresses causes the switch to enter forwarding mode

ARP Spoofing Attacks

  • Forged ARP packets send traffic to the attacker.
  • This floods the switch by sending ARP-request and ARP-reply.
  • ARP table is poisoned with incorrect entries, which deflect the traffic to the attacker.

Threats of ARP Poisoning

  • Diverting communications between two machines through fake ARP messages.
  • Packet sniffing, session hijacking, VoIP call tapping, data manipulation, Man-in-the-Middle attacks, and Denial-of-Service (DoS) attacks are types of harms from ARP Poisoning.

MAC Spoofing/Duplication

  • MAC spoofing involves actively changing or mimicking a MAC address to gain access to the network.
  • Network traffic intended for the legitimate user is intercepted and routed to the spoofer.
  • By listening to traffic on the network, malicious users can use legitimate user MAC addresses to receive traffic.

DNS Poisoning Techniques

  • DNS poisoning tricks a DNS server into accepting fake IP address information for a domain, leading to malicious links or other exploits.
  • An attacker can alter the IP address (at the DNS-server level) displayed by the server to the victims' computers; this often occurs through replacing the true IP with an illegitimate IP.

Sniffing Tool: Wireshark

  • Wireshark is a commonly used network traffic capturing and analyzing tool.
  • It supports various network types, including Ethernet, and Token-Ring.
  • Wireshark uses WinPcap and allows for editing of captures using command-line.
  • Filters allow users to quickly identify specific packets.

How to Defend Against Sniffing

  • Use HTTPS instead of HTTP to secure sensitive information.
  • Use switches where appropriate, rather than hubs, to prevent all packets from being sent to all devices.
  • Use methods like SFTP instead of FTP to securely transfer files.
  • Encrypt network communications with strong protocols (e.g., WPA2).
  • Retrieve MAC addresses from the network interface card (NIC) for security.
  • Use tools to monitor network interfaces for malicious promiscuous mode use.

How to Detect Sniffing

  • Check for devices operating in promiscuous mode.
  • Use Intrusion Detection Systems (IDS) to detect changes in MAC addresses.
  • Use network tools to monitor and identify unusual packets, as well.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Sniffing - Module 07 - PDF

More Like This

Use Quizgecko on...
Browser
Browser