SlideShare a Scribd company logo
1 of 12
SNIFFER FOR
DETECTING LOST
MOBILE
Agenda
Introduction
Sniffer
Primary goals
Application
Area of Focus
Summary
SNIFFER FOR DETECTING LOST MOBILE 2
Introduction
The primary purpose of a sniffer is to find misplaced mobile devices. Every
day, thousands of mobile phones are misplaced or lost. Although the
manufacturers of the mobile devices have implemented an effective method
to block the lost mobile to stop unauthorized individuals from placing and
receiving calls, there has been very little advancement in the field of
misplaced mobile phone detection. SNIFFER is essential for finding
misplaced mobile devices.
SNIFFER FOR DETECTING LOST MOBILE 3
What is “Sniffer” ?
A "sniffer" refers to a tool or program that is used to capture
and analyze network data traffic. It is also known as a
"packet sniffer" or "network sniffer." The primary purpose of
a sniffer is to intercept and log network traffic for various
purposes, including network troubleshooting, security
analysis, and monitoring.
SNIFFER FOR DETECTING LOST MOBILE 4
Sniffer Types:
SNIFFER FOR DETECTING LOST MOBILE 5
Software Hardware
Software Sniffer
 Packet Capture: Software sniffers operate by capturing data packets as they
traverse a network.
 Network Interface: The sniffer interacts with the network interface of a device,
allowing it to access and intercept the data packets passing through the network.
 Promiscuous Mode: In this mode, the interface captures all incoming and
outgoing packets, not just those intended for the device.
 Packet Analysis: This analysis can be used for various purposes, including
network troubleshooting, monitoring, and security.
 Display and Logging: Sniffers may also log the captured data for later review or
analysis.
SNIFFER FOR DETECTING LOST MOBILE 6
Hardware Sniffer
SNIFFER FOR DETECTING LOST MOBILE 7
Physical Connection: They may be inserted between network devices or connected to a network tap.
Data Interception: Some hardware sniffers can capture and store large volumes of data for in-depth analysis.
Analysis and Processing: Hardware sniffers often have built-in processors for real-time analysis of captured
packets. They may perform filtering, protocol decoding, and other tasks to extract meaningful information.
Output Interface: The results of the analysis can be presented through various output interfaces, such as a
display screen or network connection for remote monitoring.
Logging and Storage: Like software sniffers, hardware sniffers may have the capability to log and store
captured data for later examination.
Primary goals
 Finding lost mobiles effectively.
 Cost Effective.
 Low power Consumption.
 Easy to Design.
Application
SNIFFER FOR DETECTING LOST MOBILE 9
 Traffic Monitoring and Issue Identification: A sniffer is a program designed to
monitor and analyze network traffic to identify bottlenecks and other issues.
 Legal and Illegal Use: Sniffers can be used both legally and illegally. Legitimate
uses involve monitoring and troubleshooting network issues.
 Router Functionality: Network routers play a crucial role in determining the path
of each data packet within a network.
 Address and Content Reading: Sniffer-equipped routers can read information
such as source and destination addresses and the actual content of data packets.
 Preventing Traffic Issues: Sniffers are employed on academic networks to avoid
congestion caused by file-sharing programs.
Areas of focus
The power of the mobile phone should be sufficient, it
shouldn’t be in the shadow region, etc. are some of the
boundary requirements or criteria that must be met for the
identification of the lost mobile. this approach can be
enhanced by employing current technologies and
equipment.
SNIFFER FOR DETECTING LOST MOBILE 10
Summary
this most popular devices in the sphere of communication since technological growth
is the mobile phone. Many mobile phones are forgotten or lost for various causes,
hence this study serves as the foundation for the Sniffer Technology for Detecting
Mobile Phones. Sniffer base station, unidirectional antenna, and software for tracking
procedure were the three primary parts we used for this process. The antenna's
design is crucial because detection is correctly dependent on signal intensity or
directivity, with detection occurring in the same general direction as where the signal
strength is greatest.
SNIFFER FOR DETECTING LOST MOBILE 11
Thank you
2023

More Related Content

Similar to SNIFFER FOR DETECTING LOST MOBILE ppt arya

IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleGregory Hanis
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobilesakhila immadisetty
 
Network forensics
Network forensicsNetwork forensics
Network forensicsArthyR3
 
Droidcon mobile security
Droidcon   mobile securityDroidcon   mobile security
Droidcon mobile securityJudy Ngure
 
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...IRJET Journal
 
DasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperDasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperMichael Murphy
 
A Survey on Communication for Smartphone
A Survey on Communication for SmartphoneA Survey on Communication for Smartphone
A Survey on Communication for SmartphoneEditor IJMTER
 
Sherlock: Monitoring sensor broadcasted data to optimize mobile environment
Sherlock: Monitoring sensor broadcasted data to optimize mobile environmentSherlock: Monitoring sensor broadcasted data to optimize mobile environment
Sherlock: Monitoring sensor broadcasted data to optimize mobile environmentijsrd.com
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
 
Air Programming on Sunspot with use of Wireless Networks
Air Programming on Sunspot with use of Wireless NetworksAir Programming on Sunspot with use of Wireless Networks
Air Programming on Sunspot with use of Wireless Networksijsrd.com
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Lancope, Inc.
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSIJNSA Journal
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSIJNSA Journal
 

Similar to SNIFFER FOR DETECTING LOST MOBILE ppt arya (20)

IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Network forensics
Network forensicsNetwork forensics
Network forensics
 
Droidcon mobile security
Droidcon   mobile securityDroidcon   mobile security
Droidcon mobile security
 
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
 
Targettracking
TargettrackingTargettracking
Targettracking
 
Outes
OutesOutes
Outes
 
DasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperDasGreenPerezMurphy_Paper
DasGreenPerezMurphy_Paper
 
A Survey on Communication for Smartphone
A Survey on Communication for SmartphoneA Survey on Communication for Smartphone
A Survey on Communication for Smartphone
 
Sherlock: Monitoring sensor broadcasted data to optimize mobile environment
Sherlock: Monitoring sensor broadcasted data to optimize mobile environmentSherlock: Monitoring sensor broadcasted data to optimize mobile environment
Sherlock: Monitoring sensor broadcasted data to optimize mobile environment
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
 
Air Programming on Sunspot with use of Wireless Networks
Air Programming on Sunspot with use of Wireless NetworksAir Programming on Sunspot with use of Wireless Networks
Air Programming on Sunspot with use of Wireless Networks
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
NFC Health Monitoring System
NFC Health Monitoring SystemNFC Health Monitoring System
NFC Health Monitoring System
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 

SNIFFER FOR DETECTING LOST MOBILE ppt arya

  • 2. Agenda Introduction Sniffer Primary goals Application Area of Focus Summary SNIFFER FOR DETECTING LOST MOBILE 2
  • 3. Introduction The primary purpose of a sniffer is to find misplaced mobile devices. Every day, thousands of mobile phones are misplaced or lost. Although the manufacturers of the mobile devices have implemented an effective method to block the lost mobile to stop unauthorized individuals from placing and receiving calls, there has been very little advancement in the field of misplaced mobile phone detection. SNIFFER is essential for finding misplaced mobile devices. SNIFFER FOR DETECTING LOST MOBILE 3
  • 4. What is “Sniffer” ? A "sniffer" refers to a tool or program that is used to capture and analyze network data traffic. It is also known as a "packet sniffer" or "network sniffer." The primary purpose of a sniffer is to intercept and log network traffic for various purposes, including network troubleshooting, security analysis, and monitoring. SNIFFER FOR DETECTING LOST MOBILE 4
  • 5. Sniffer Types: SNIFFER FOR DETECTING LOST MOBILE 5 Software Hardware
  • 6. Software Sniffer  Packet Capture: Software sniffers operate by capturing data packets as they traverse a network.  Network Interface: The sniffer interacts with the network interface of a device, allowing it to access and intercept the data packets passing through the network.  Promiscuous Mode: In this mode, the interface captures all incoming and outgoing packets, not just those intended for the device.  Packet Analysis: This analysis can be used for various purposes, including network troubleshooting, monitoring, and security.  Display and Logging: Sniffers may also log the captured data for later review or analysis. SNIFFER FOR DETECTING LOST MOBILE 6
  • 7. Hardware Sniffer SNIFFER FOR DETECTING LOST MOBILE 7 Physical Connection: They may be inserted between network devices or connected to a network tap. Data Interception: Some hardware sniffers can capture and store large volumes of data for in-depth analysis. Analysis and Processing: Hardware sniffers often have built-in processors for real-time analysis of captured packets. They may perform filtering, protocol decoding, and other tasks to extract meaningful information. Output Interface: The results of the analysis can be presented through various output interfaces, such as a display screen or network connection for remote monitoring. Logging and Storage: Like software sniffers, hardware sniffers may have the capability to log and store captured data for later examination.
  • 8. Primary goals  Finding lost mobiles effectively.  Cost Effective.  Low power Consumption.  Easy to Design.
  • 9. Application SNIFFER FOR DETECTING LOST MOBILE 9  Traffic Monitoring and Issue Identification: A sniffer is a program designed to monitor and analyze network traffic to identify bottlenecks and other issues.  Legal and Illegal Use: Sniffers can be used both legally and illegally. Legitimate uses involve monitoring and troubleshooting network issues.  Router Functionality: Network routers play a crucial role in determining the path of each data packet within a network.  Address and Content Reading: Sniffer-equipped routers can read information such as source and destination addresses and the actual content of data packets.  Preventing Traffic Issues: Sniffers are employed on academic networks to avoid congestion caused by file-sharing programs.
  • 10. Areas of focus The power of the mobile phone should be sufficient, it shouldn’t be in the shadow region, etc. are some of the boundary requirements or criteria that must be met for the identification of the lost mobile. this approach can be enhanced by employing current technologies and equipment. SNIFFER FOR DETECTING LOST MOBILE 10
  • 11. Summary this most popular devices in the sphere of communication since technological growth is the mobile phone. Many mobile phones are forgotten or lost for various causes, hence this study serves as the foundation for the Sniffer Technology for Detecting Mobile Phones. Sniffer base station, unidirectional antenna, and software for tracking procedure were the three primary parts we used for this process. The antenna's design is crucial because detection is correctly dependent on signal intensity or directivity, with detection occurring in the same general direction as where the signal strength is greatest. SNIFFER FOR DETECTING LOST MOBILE 11