SlideShare a Scribd company logo
1 of 13
Packet Capturing
1
Packet Capturing
 Computer software that can intercept and log traffic passing over a digital
network or part of a network is better known as packet sniffer.
 The sniffer captures these packets by setting the NIC card in the
promiscuous mode and eventually decodes them.
 In a network, promiscuous mode allows a network device to intercept and
read each network packet that arrives in its entirety.
 It is a ultimate troubleshooting tool.
2
Content
 PACKET SNIFFER
 METHODS
 USES
 CAPABILITIES
 IMPLEMENTATION
 DETECTION
 CONCLUSION
3
Packet Sniffer
 Packet sniffer is a program running in a network attached device that
passively receives all data link layer frames passing through the device's
network adapter. It is also known as Network or Protocol Analyzer or
Ethernet Sniffer.
 The packet sniffer captures the data that is addressed to other machines,
saving it for later analysis.
 Packet sniffing is a passive technique, no one is attacking your computer
and investigating through files, most of the time, system administrator uses
packet sniffer to troubleshoot network problems.
4
Sniffing Methods
 Sniffing method works in switched and non switched network.
 Switched Networks
 Non-Switched Networks
 Sniffing Methods
 IP Based Sniffing
 MAC Based Sniffing
 ARP Based Sniffing
5
Sniffing Methods (Cont.)
 IP Based Sniffing
It works by putting the network card into promiscuous mode and sniffing all packets
matching the IP address filter. Normally, the IP address filter isn’t set so it can capture all
the packets. This method only works in non-switched networks.
 MAC Based Sniffing
This method works by putting the network card into promiscuous mode and sniffing all
packets matching the MAC address filter.
 ARP Based Sniffing
This method works a little different. It doesn’t put the network card into promiscuous
mode. This isn’t necessary because ARP packets will be sent to us. This happens because
the ARP protocol is stateless. Because of this, sniffing can be done on a switched network.
6
Why we use sniffers ?
 Detection of clear-text username and passwords from the
network.
 Network instruction detection in order to discover hackers.
 Used to debug communication between a client and a
server.
 Used to make network more secure- In order to come
through to your network, it must pass through the packet
sniffer..
 Use to troubleshooting the network issues.
7
Capabilities of Sniffers
 A sniffer program allows a user to watch all network
traffic over any network interfaces connected to the host
machine.
 A sniffer program can watch TCP, IP, UDP, ICMP, ARP,
RARP.
 A sniffer also lets you watch port specific traffic for
monitoring http, ftp, telnet, etc. traffic
8
Implementation
 Create a raw socket.
 Put it in a “recvfrom” loop and receive data on it.
A raw socket when put in “recvfrom” loop receives all incoming packets. This is
because it is not bound to a particular address or port.
sock_raw = socket(AF_INET , SOCK_RAW , IPPROTO_TCP);
while(1)
{
data_size = recvfrom(sock_raw , buffer , 65536 , 0 , &saddr , &saddr_size);
}
That's all. The buffer will hold the data sniffed or picked up. The sniffing part
is actually complete over here. The next task is to actually read the
captured packet, analyze it and present it to the user in a readable
format.
9
Detection Of Sniffers
 The DNS Test
In this method, the detection tool itself is in promiscuous mode. We
create numerous fake TCP connections on our network segment,
expecting a poorly written sniffer to pick up on those connections and
resolve the IP addresses of the nonexistent hosts.
 The ARP Test
• When a sniffer is suspected on a switched network a utility called
“arpwatch” is available. Using this utility allows one to monitor the ARP
cache of a machine to look for duplication for a machine.
• If this is so, alarms may be triggered which can lead to the detection of
sniffers.
10
Detection Of Sniffers (Cont.)
 The Ping Test
• Uses the fact that if a ping request is sent with an IP address rather
than a MAC address it should not be seen by anyone on the
network since the MAC address will not find a match.
• Each Ethernet Adapter will reject the request.
• If there is a sniffer on the machine of the IP used there will be a
response because this machine doesn’t reject packets with a MAC
address of other destinations.
• An old method, no longer considered reliable.
11
Conclusion
 Packet sniffers are a serious matter for network security.
 A packet sniffer is not just a hacker’s tool. It can be used for network
troubleshooting and other useful purposes.
 However, in the wrong hands, a packet sniffer can capture sensitive
personal information that can lead to invasion of privacy.
12
13

More Related Content

What's hot

Geometric correction
Geometric correctionGeometric correction
Geometric correctionDocumentStory
 
Digital image processing
Digital image processingDigital image processing
Digital image processingVandana Verma
 
Environment Management Using GIS
Environment Management Using GISEnvironment Management Using GIS
Environment Management Using GISgisconsortium
 
Models of spatial process by sushant
Models of spatial process by sushantModels of spatial process by sushant
Models of spatial process by sushantsushantsawant13
 
GEOGRAPHICAL INFORMATION SYSTEM (GIS)
GEOGRAPHICAL INFORMATION SYSTEM (GIS)GEOGRAPHICAL INFORMATION SYSTEM (GIS)
GEOGRAPHICAL INFORMATION SYSTEM (GIS)MAHENDRA PRATAP SWAIN
 
Introduction to gps [compatibility mode]
Introduction to gps [compatibility mode]Introduction to gps [compatibility mode]
Introduction to gps [compatibility mode]Sumanta Das
 
Errors and biases in gps
Errors and biases in gpsErrors and biases in gps
Errors and biases in gpsmaneeb
 
Digital image processing 1
Digital  image processing 1Digital  image processing 1
Digital image processing 1Dhaval Jalalpara
 
Conversion of Existing Data
Conversion of Existing DataConversion of Existing Data
Conversion of Existing DataTilok Chetri
 
Handheld GPS Training for Municipal Use
Handheld GPS Training for Municipal UseHandheld GPS Training for Municipal Use
Handheld GPS Training for Municipal UseRaine
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigationOnline
 
Remote sensing [compatibility mode]
Remote sensing [compatibility mode]Remote sensing [compatibility mode]
Remote sensing [compatibility mode]Sumanta Das
 

What's hot (20)

Bhuvan
Bhuvan Bhuvan
Bhuvan
 
Geometric correction
Geometric correctionGeometric correction
Geometric correction
 
Digital image processing
Digital image processingDigital image processing
Digital image processing
 
Introduction-of-GNSS-2
Introduction-of-GNSS-2Introduction-of-GNSS-2
Introduction-of-GNSS-2
 
Environment Management Using GIS
Environment Management Using GISEnvironment Management Using GIS
Environment Management Using GIS
 
Radar Application
Radar ApplicationRadar Application
Radar Application
 
Models of spatial process by sushant
Models of spatial process by sushantModels of spatial process by sushant
Models of spatial process by sushant
 
GEOGRAPHICAL INFORMATION SYSTEM (GIS)
GEOGRAPHICAL INFORMATION SYSTEM (GIS)GEOGRAPHICAL INFORMATION SYSTEM (GIS)
GEOGRAPHICAL INFORMATION SYSTEM (GIS)
 
Introduction to gps [compatibility mode]
Introduction to gps [compatibility mode]Introduction to gps [compatibility mode]
Introduction to gps [compatibility mode]
 
Satellite Image
Satellite Image Satellite Image
Satellite Image
 
Errors and biases in gps
Errors and biases in gpsErrors and biases in gps
Errors and biases in gps
 
GPS-errors-1
GPS-errors-1GPS-errors-1
GPS-errors-1
 
Digital image processing 1
Digital  image processing 1Digital  image processing 1
Digital image processing 1
 
Conversion of Existing Data
Conversion of Existing DataConversion of Existing Data
Conversion of Existing Data
 
Handheld GPS Training for Municipal Use
Handheld GPS Training for Municipal UseHandheld GPS Training for Municipal Use
Handheld GPS Training for Municipal Use
 
GIS
GISGIS
GIS
 
GPS ERRORS
GPS ERRORS GPS ERRORS
GPS ERRORS
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigation
 
Remote sensing [compatibility mode]
Remote sensing [compatibility mode]Remote sensing [compatibility mode]
Remote sensing [compatibility mode]
 
GPS
GPSGPS
GPS
 

Similar to Packet capturing

Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffingBhavya Chawla
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LANArpit Suthar
 
Network monotoring
Network monotoringNetwork monotoring
Network monotoringProgrammer
 
A REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESA REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESIRJET Journal
 
An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffingijcses
 
For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laShainaBoling829
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxMahdiHasanSowrav
 
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...IJNSA Journal
 
A Survey on different Port Scanning Methods and the Tools used to perform the...
A Survey on different Port Scanning Methods and the Tools used to perform the...A Survey on different Port Scanning Methods and the Tools used to perform the...
A Survey on different Port Scanning Methods and the Tools used to perform the...Naomi Hansen
 
04-post-connection-attacks.pdf
04-post-connection-attacks.pdf04-post-connection-attacks.pdf
04-post-connection-attacks.pdfxasako1838
 
Chapter 12
Chapter 12Chapter 12
Chapter 12cclay3
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol AnalyzerSourav Roy
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contestnkrafacyberclub
 
Scanning.pptx
Scanning.pptxScanning.pptx
Scanning.pptxJazzyB5
 

Similar to Packet capturing (20)

Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffing
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LAN
 
Network monotoring
Network monotoringNetwork monotoring
Network monotoring
 
A REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESA REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURES
 
An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffing
 
For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and la
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptx
 
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
 
A Survey on different Port Scanning Methods and the Tools used to perform the...
A Survey on different Port Scanning Methods and the Tools used to perform the...A Survey on different Port Scanning Methods and the Tools used to perform the...
A Survey on different Port Scanning Methods and the Tools used to perform the...
 
Wiretapping
WiretappingWiretapping
Wiretapping
 
04-post-connection-attacks.pdf
04-post-connection-attacks.pdf04-post-connection-attacks.pdf
04-post-connection-attacks.pdf
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Nmap
NmapNmap
Nmap
 
Contents namp
Contents nampContents namp
Contents namp
 
Contents namp
Contents nampContents namp
Contents namp
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contest
 
Scanning.pptx
Scanning.pptxScanning.pptx
Scanning.pptx
 

Recently uploaded

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 

Packet capturing

  • 2. Packet Capturing  Computer software that can intercept and log traffic passing over a digital network or part of a network is better known as packet sniffer.  The sniffer captures these packets by setting the NIC card in the promiscuous mode and eventually decodes them.  In a network, promiscuous mode allows a network device to intercept and read each network packet that arrives in its entirety.  It is a ultimate troubleshooting tool. 2
  • 3. Content  PACKET SNIFFER  METHODS  USES  CAPABILITIES  IMPLEMENTATION  DETECTION  CONCLUSION 3
  • 4. Packet Sniffer  Packet sniffer is a program running in a network attached device that passively receives all data link layer frames passing through the device's network adapter. It is also known as Network or Protocol Analyzer or Ethernet Sniffer.  The packet sniffer captures the data that is addressed to other machines, saving it for later analysis.  Packet sniffing is a passive technique, no one is attacking your computer and investigating through files, most of the time, system administrator uses packet sniffer to troubleshoot network problems. 4
  • 5. Sniffing Methods  Sniffing method works in switched and non switched network.  Switched Networks  Non-Switched Networks  Sniffing Methods  IP Based Sniffing  MAC Based Sniffing  ARP Based Sniffing 5
  • 6. Sniffing Methods (Cont.)  IP Based Sniffing It works by putting the network card into promiscuous mode and sniffing all packets matching the IP address filter. Normally, the IP address filter isn’t set so it can capture all the packets. This method only works in non-switched networks.  MAC Based Sniffing This method works by putting the network card into promiscuous mode and sniffing all packets matching the MAC address filter.  ARP Based Sniffing This method works a little different. It doesn’t put the network card into promiscuous mode. This isn’t necessary because ARP packets will be sent to us. This happens because the ARP protocol is stateless. Because of this, sniffing can be done on a switched network. 6
  • 7. Why we use sniffers ?  Detection of clear-text username and passwords from the network.  Network instruction detection in order to discover hackers.  Used to debug communication between a client and a server.  Used to make network more secure- In order to come through to your network, it must pass through the packet sniffer..  Use to troubleshooting the network issues. 7
  • 8. Capabilities of Sniffers  A sniffer program allows a user to watch all network traffic over any network interfaces connected to the host machine.  A sniffer program can watch TCP, IP, UDP, ICMP, ARP, RARP.  A sniffer also lets you watch port specific traffic for monitoring http, ftp, telnet, etc. traffic 8
  • 9. Implementation  Create a raw socket.  Put it in a “recvfrom” loop and receive data on it. A raw socket when put in “recvfrom” loop receives all incoming packets. This is because it is not bound to a particular address or port. sock_raw = socket(AF_INET , SOCK_RAW , IPPROTO_TCP); while(1) { data_size = recvfrom(sock_raw , buffer , 65536 , 0 , &saddr , &saddr_size); } That's all. The buffer will hold the data sniffed or picked up. The sniffing part is actually complete over here. The next task is to actually read the captured packet, analyze it and present it to the user in a readable format. 9
  • 10. Detection Of Sniffers  The DNS Test In this method, the detection tool itself is in promiscuous mode. We create numerous fake TCP connections on our network segment, expecting a poorly written sniffer to pick up on those connections and resolve the IP addresses of the nonexistent hosts.  The ARP Test • When a sniffer is suspected on a switched network a utility called “arpwatch” is available. Using this utility allows one to monitor the ARP cache of a machine to look for duplication for a machine. • If this is so, alarms may be triggered which can lead to the detection of sniffers. 10
  • 11. Detection Of Sniffers (Cont.)  The Ping Test • Uses the fact that if a ping request is sent with an IP address rather than a MAC address it should not be seen by anyone on the network since the MAC address will not find a match. • Each Ethernet Adapter will reject the request. • If there is a sniffer on the machine of the IP used there will be a response because this machine doesn’t reject packets with a MAC address of other destinations. • An old method, no longer considered reliable. 11
  • 12. Conclusion  Packet sniffers are a serious matter for network security.  A packet sniffer is not just a hacker’s tool. It can be used for network troubleshooting and other useful purposes.  However, in the wrong hands, a packet sniffer can capture sensitive personal information that can lead to invasion of privacy. 12
  • 13. 13