0
Packet Sniffers         Prepared By:         Amer Alhorini        Supervised By:       Dr. Loai Tawalbeh             NYITN...
The Network Today                    2
Packet Sniffers Host A                                                                  Host B                 Router A   ...
Packet Sniffer Mitigation Host A                                                               Host B              Router ...
Trends that Affect Security• Increase of network attacks• Increased sophistication of attacks• Increased dependence on the...
Network Threats Attack Examples• There are four general categories of security threats to the  network:    Unstructured th...
Four Classes of Network Attacks Reconnaissance attacks Access attacks Denial of service attacks Worms, viruses, and Trojan...
Specific Attack Types• All of the following can be used to compromise your system:    Packet sniffers    IP weaknesses    ...
Reconnaissance Attack Example• Sample IP  address  query              Sample              domain              name        ...
Reconnaissance Attack Example• Sample IP  address  query              Sample              domain              name        ...
Upcoming SlideShare
Loading in...5
×

Sniffer[1]

635

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
635
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
58
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Sniffer[1]"

  1. 1. Packet Sniffers Prepared By: Amer Alhorini Supervised By: Dr. Loai Tawalbeh NYITNew York Institute of Technology 1
  2. 2. The Network Today 2
  3. 3. Packet Sniffers Host A Host B Router A Router B• A packet sniffer is a software application that uses a network adapter card in promiscuous mode to capture all network packets. The following are the packet sniffer features: Packet sniffers exploit information passed in clear text. Protocols that pass information in the clear include the following: •Telnet •FTP •SNMP •POP Packet sniffers must be on the same collision domain. 3
  4. 4. Packet Sniffer Mitigation Host A Host B Router A Router B• The following techniques and tools can be used to mitigate sniffers: Authentication—Using strong authentication, such as one-time passwords, is a first option for defense against packet sniffers. Switched infrastructure—Deploy a switched infrastructure to counter the use of packet sniffers in your environment. Antisniffer tools—Use these tools to employ software and hardware designed to detect the use of sniffers on a network. Cryptography—The most effective method for countering packet sniffers does not prevent or detect packet sniffers, but rather renders them irrelevant. 4
  5. 5. Trends that Affect Security• Increase of network attacks• Increased sophistication of attacks• Increased dependence on the network• Lack of trained personnel• Lack of awareness• Lack of security policies• Wireless access• Legislation• Litigation 5
  6. 6. Network Threats Attack Examples• There are four general categories of security threats to the network: Unstructured threats Structured threats External threats Internal exploitation Internal threats Internet Dial-in Ex exploitation ex tern pl o a l it a ti o n Compromised host 6
  7. 7. Four Classes of Network Attacks Reconnaissance attacks Access attacks Denial of service attacks Worms, viruses, and Trojan horses 7
  8. 8. Specific Attack Types• All of the following can be used to compromise your system: Packet sniffers IP weaknesses Password attacks DoS or DDoS Man-in-the-middle attacks Application layer attacks Trust exploitation Port redirection Virus Trojan horse Operator error Worms 8
  9. 9. Reconnaissance Attack Example• Sample IP address query Sample domain name query 9
  10. 10. Reconnaissance Attack Example• Sample IP address query Sample domain name query 9
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×