This document summarizes packet sniffing in switched network environments. It discusses how tools like ARP spoofing can allow an attacker to intercept network traffic in a switched network by performing a man-in-the-middle attack. The document provides examples of using tools like dsniff and ScoopLM to sniff plaintext usernames and passwords in non-switched networks. It also explains how ARP spoofing works to redirect traffic to an attacker's machine in a switched network, enabling packet sniffing. Encryption is presented as the most effective defense against packet sniffing threats.