Now that might make less sense since most of the major websites are over https but imagine same if the end user is using same credentials for other sites like LinkedIn, Twitter, etc. Username and password over the insecure http are vulnerable to packet sniffing. Imagine if you are visiting an http site and the site requires authentication. What information can be retrieved from a sniffer?Īny data that is passed over the network in clear text is vulnerable to sniffing. Since all the traffic on a computer is handled by network adapter (Ethernet/wireless), sniffers work by configuring the system’s NIC in promiscuous mode. How does a packet sniffer work?įirst, we need to understand that packet sniffing can be both passive and active and that totally depends on the sniffer capability and environment design (hub or switch). Another point to note is that packet sniffing applicable to both wired and wireless networks. Obviously, placement of packet sniffer in an environment is crucial. In other very simple terms, a packet sniffer is a program that can see all traffic flowing over the network back and forth. It is used both by administrators for diagnostic or troubleshooting purposes and also by hackers to steal data transmitted over the network. To monitor the data transmitted over a network packet sniffers are used.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |