SlideShare a Scribd company logo
Mustajar Ahmad Shah
• Introduction
• What is sniffer
• Sniffing Threats
• How a sniffer Work
• Type of Sniffing
• Protocol vulnerable to sniffing
• Tools to Sniff Network Traffic
• How to setup a Sniffing Attack
• How to protect your self from Sniffing
• Tools to detect sniffer on a network
Wire tapping is process of monitoring the Telephone and Internet conversation
by third party.
Type of Wiretapping
A Sniffer is a packet-capturing or frame-capturing tool.
It basically captures and displays the data as it is being transmitted from host to
host on the network.
A Sniffer turns the NIC of a system into Promiscuous(pro-mis-cu-os) mode
so that it listen all the data transmitted on its segment.
Sniffer can constantly Read all the information entering to the computer
through NIC by Decoding the Information encapsulated in Data Packet.
There are Two types of Sniffing Attack
Active Sniffing
Passive Sniffing
“Passive Sniffing “mean sniffing trough a Hub.
Passive Sniffing Involves sending no packets, and
Monitoring the Packets sent by others.
But Hub Usage is Outdated today.
When Sniffing is performed on a Switched network, is
known as “Active Sniffing”.
Active Sniffing Relies on Injecting Packets (ARP) into the
Network, that Cause traffic.
Telnet
and
Rlogin
HTTP SMTP NNTP POP FTP IMAP
Keystrokes including User
Name & Passwords
Data sent in clear text
Password and data sent in clear text
Password and data sent in clear text
SPAN Port is Port which is configure to Receive a Copy
of Every Packet that passes through a Switch
Sniffing Tools
WireShark
TCP Dump
Cain & Able
Capsa
Restrict the physical access to the network media to ensure that a packet
sniffer cannot be installed
Use Encryption to protect confidential information
Permanently Add MAC address of the Gateway to ARP cache
Use static IP Address and Static ARP tables to prevent attacker from
adding the spoofed ARP entries for machines in the network
Turn off network identification broadcasts and if possible restrict the
network to authorized users in order to protect network form being with
sniffing tools
Use UPv6 instead of IPv4 protocol
Use encrypted session such as SSJ instead of Telnet, Secure Copy (SCP)
instead of FTP, SSL for E-mail connection, etc. to protect wireless
network users against sniffing attack.
Use Network Tools
Such as HP
Performance insight to
monitor the network for
strange Packets
Use IDS
Detect
Promiscuous Mode
Wiretapping
Wiretapping
Wiretapping
Wiretapping

More Related Content

What's hot

Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
guestfa1226
 
Password sniffing
Password sniffingPassword sniffing
Password sniffing
SRIMCA
 
Sniffer[1]
Sniffer[1]Sniffer[1]
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer
vilss
 
Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repot
Kunal Thakur
 
PACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATIONPACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATION
Goutham Royal
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning
Viren Rao
 
Packet sniffing
Packet sniffingPacket sniffing
Packet sniffing
Tanmay 'Unsinkable'
 
Network packet analysis -capture and Analysis
Network packet analysis -capture and AnalysisNetwork packet analysis -capture and Analysis
Network packet analysis -capture and Analysis
Manjushree Mashal
 
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
Prabhdeep Kaur
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
Sourav Roy
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
Kunal Thakur
 
Introduction to Snort
Introduction to SnortIntroduction to Snort
Introduction to Snort
Hossein Yavari
 
Snort
SnortSnort
Snort
SnortSnort
Snort
nazzf
 
Wireless Attacks
Wireless AttacksWireless Attacks
Wireless Attacks
primeteacher32
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
guestd05b31
 
Network sec 1
Network sec 1Network sec 1
Network sec 1
Jasleen Kaur
 
Java Abs Packet Sniffer Tool
Java Abs   Packet Sniffer ToolJava Abs   Packet Sniffer Tool
Java Abs Packet Sniffer Tool
ncct
 
Packet capturing
Packet capturingPacket capturing
Packet capturing
PankajSingh1035
 

What's hot (20)

Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
 
Password sniffing
Password sniffingPassword sniffing
Password sniffing
 
Sniffer[1]
Sniffer[1]Sniffer[1]
Sniffer[1]
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer
 
Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repot
 
PACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATIONPACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATION
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning
 
Packet sniffing
Packet sniffingPacket sniffing
Packet sniffing
 
Network packet analysis -capture and Analysis
Network packet analysis -capture and AnalysisNetwork packet analysis -capture and Analysis
Network packet analysis -capture and Analysis
 
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Introduction to Snort
Introduction to SnortIntroduction to Snort
Introduction to Snort
 
Snort
SnortSnort
Snort
 
Snort
SnortSnort
Snort
 
Wireless Attacks
Wireless AttacksWireless Attacks
Wireless Attacks
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Network sec 1
Network sec 1Network sec 1
Network sec 1
 
Java Abs Packet Sniffer Tool
Java Abs   Packet Sniffer ToolJava Abs   Packet Sniffer Tool
Java Abs Packet Sniffer Tool
 
Packet capturing
Packet capturingPacket capturing
Packet capturing
 

Viewers also liked

Anti wiretapping-act
Anti wiretapping-actAnti wiretapping-act
Anti wiretapping-act
Grace Begya-Salak
 
Us legislation authorizing wiretapping
Us legislation authorizing wiretappingUs legislation authorizing wiretapping
Us legislation authorizing wiretapping
Angela Strudwick
 
Internet Wiretapping - Government and Law Use (Omnivore, Carnivore, DragonWar...
Internet Wiretapping - Government and Law Use (Omnivore, Carnivore, DragonWar...Internet Wiretapping - Government and Law Use (Omnivore, Carnivore, DragonWar...
Internet Wiretapping - Government and Law Use (Omnivore, Carnivore, DragonWar...
Phelipe Folgierini
 
Anti wiretapping law and related issues consti-ii
Anti wiretapping law and related issues consti-iiAnti wiretapping law and related issues consti-ii
Anti wiretapping law and related issues consti-ii
del24
 
Wiretaps
WiretapsWiretaps
Metasploit @ 2010 Utah Open Source Conference
Metasploit @ 2010 Utah Open Source ConferenceMetasploit @ 2010 Utah Open Source Conference
Metasploit @ 2010 Utah Open Source Conference
Jason Wood
 
Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
 
Metasploit
MetasploitMetasploit
Metasploit
ninguna
 
Sniffer
SnifferSniffer
Sniffer
Stelcy Jose
 
Basic Metasploit
Basic MetasploitBasic Metasploit
Basic Metasploit
Muhammad Ridwan
 
Metasploit for Penetration Testing: Beginner Class
Metasploit for Penetration Testing: Beginner ClassMetasploit for Penetration Testing: Beginner Class
Metasploit for Penetration Testing: Beginner Class
Georgia Weidman
 

Viewers also liked (12)

Anti wiretapping-act
Anti wiretapping-actAnti wiretapping-act
Anti wiretapping-act
 
Us legislation authorizing wiretapping
Us legislation authorizing wiretappingUs legislation authorizing wiretapping
Us legislation authorizing wiretapping
 
Internet Wiretapping - Government and Law Use (Omnivore, Carnivore, DragonWar...
Internet Wiretapping - Government and Law Use (Omnivore, Carnivore, DragonWar...Internet Wiretapping - Government and Law Use (Omnivore, Carnivore, DragonWar...
Internet Wiretapping - Government and Law Use (Omnivore, Carnivore, DragonWar...
 
Anti wiretapping law and related issues consti-ii
Anti wiretapping law and related issues consti-iiAnti wiretapping law and related issues consti-ii
Anti wiretapping law and related issues consti-ii
 
Wiretaps
WiretapsWiretaps
Wiretaps
 
Metasploit @ 2010 Utah Open Source Conference
Metasploit @ 2010 Utah Open Source ConferenceMetasploit @ 2010 Utah Open Source Conference
Metasploit @ 2010 Utah Open Source Conference
 
Social engineering
Social engineering Social engineering
Social engineering
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Metasploit
MetasploitMetasploit
Metasploit
 
Sniffer
SnifferSniffer
Sniffer
 
Basic Metasploit
Basic MetasploitBasic Metasploit
Basic Metasploit
 
Metasploit for Penetration Testing: Beginner Class
Metasploit for Penetration Testing: Beginner ClassMetasploit for Penetration Testing: Beginner Class
Metasploit for Penetration Testing: Beginner Class
 

Similar to Wiretapping

Chapter 12
Chapter 12Chapter 12
Chapter 12
cclay3
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contest
nkrafacyberclub
 
OSTU - Chris Sanders on Wireshark
OSTU - Chris Sanders on WiresharkOSTU - Chris Sanders on Wireshark
OSTU - Chris Sanders on Wireshark
Denny K
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
sweta dargad
 
Ceh v5 module 07 sniffers
Ceh v5 module 07 sniffersCeh v5 module 07 sniffers
Ceh v5 module 07 sniffers
Vi Tính Hoàng Nam
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
leminhvuong
 
Nmap & Network sniffing
Nmap & Network sniffingNmap & Network sniffing
Nmap & Network sniffing
Mukul Sahu
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
Jessica Thompson
 
SOFTWARE TOOLS(Bhavik).pptx
SOFTWARE TOOLS(Bhavik).pptxSOFTWARE TOOLS(Bhavik).pptx
SOFTWARE TOOLS(Bhavik).pptx
Karan216380
 
an_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptan_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.ppt
Iwan89629
 
Ip security
Ip security Ip security
Ip security
Dr.K.Sreenivas Rao
 
Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far
AlleneMcclendon878
 
Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repot
Kunal Thakur
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
masoodnt10
 
Router forensics
Router forensicsRouter forensics
Router forensics
Taruna Chauhan
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
Nutan Kumar Panda
 
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANAvoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Editor IJCATR
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
Sourav Roy
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
sweta dargad
 

Similar to Wiretapping (20)

Chapter 12
Chapter 12Chapter 12
Chapter 12
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contest
 
OSTU - Chris Sanders on Wireshark
OSTU - Chris Sanders on WiresharkOSTU - Chris Sanders on Wireshark
OSTU - Chris Sanders on Wireshark
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
 
Ceh v5 module 07 sniffers
Ceh v5 module 07 sniffersCeh v5 module 07 sniffers
Ceh v5 module 07 sniffers
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
 
Nmap & Network sniffing
Nmap & Network sniffingNmap & Network sniffing
Nmap & Network sniffing
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
 
SOFTWARE TOOLS(Bhavik).pptx
SOFTWARE TOOLS(Bhavik).pptxSOFTWARE TOOLS(Bhavik).pptx
SOFTWARE TOOLS(Bhavik).pptx
 
an_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptan_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.ppt
 
Ip security
Ip security Ip security
Ip security
 
Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far
 
Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repot
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
 
Router forensics
Router forensicsRouter forensics
Router forensics
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANAvoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 

More from Mr Cracker

Denial Of Service
Denial Of ServiceDenial Of Service
Denial Of Service
Mr Cracker
 
How to setup mercury wifi router
How to setup mercury wifi routerHow to setup mercury wifi router
How to setup mercury wifi router
Mr Cracker
 
Hacking Citrix Cloud Server
Hacking Citrix Cloud ServerHacking Citrix Cloud Server
Hacking Citrix Cloud Server
Mr Cracker
 
Unblock all the Blocked sites in China
Unblock all the Blocked sites in ChinaUnblock all the Blocked sites in China
Unblock all the Blocked sites in China
Mr Cracker
 
6 Blessed Sayings of Holy Prophet Muhammad
6 Blessed Sayings of Holy Prophet Muhammad6 Blessed Sayings of Holy Prophet Muhammad
6 Blessed Sayings of Holy Prophet Muhammad
Mr Cracker
 
Understanding DNS Traffic Pattern
Understanding DNS Traffic Pattern Understanding DNS Traffic Pattern
Understanding DNS Traffic Pattern
Mr Cracker
 
Xen and Art of Virtualization (Xen Architecture)
Xen and Art of Virtualization (Xen Architecture)Xen and Art of Virtualization (Xen Architecture)
Xen and Art of Virtualization (Xen Architecture)
Mr Cracker
 
China Vs World
China Vs WorldChina Vs World
China Vs World
Mr Cracker
 
Virtualization, Cloud computing and OS Fingerprinting
Virtualization, Cloud computing and OS FingerprintingVirtualization, Cloud computing and OS Fingerprinting
Virtualization, Cloud computing and OS Fingerprinting
Mr Cracker
 
Interesting Email Services (Email Hacks)
Interesting Email Services  (Email Hacks)Interesting Email Services  (Email Hacks)
Interesting Email Services (Email Hacks)
Mr Cracker
 
The Mythical Man Month
The Mythical Man MonthThe Mythical Man Month
The Mythical Man Month
Mr Cracker
 
Google Hacking and Power Search Techniques
Google Hacking and Power Search TechniquesGoogle Hacking and Power Search Techniques
Google Hacking and Power Search Techniques
Mr Cracker
 
Facts you don’t know about pakistan
Facts you don’t know about pakistanFacts you don’t know about pakistan
Facts you don’t know about pakistan
Mr Cracker
 
Interesting email service’s
Interesting email service’sInteresting email service’s
Interesting email service’s
Mr Cracker
 

More from Mr Cracker (14)

Denial Of Service
Denial Of ServiceDenial Of Service
Denial Of Service
 
How to setup mercury wifi router
How to setup mercury wifi routerHow to setup mercury wifi router
How to setup mercury wifi router
 
Hacking Citrix Cloud Server
Hacking Citrix Cloud ServerHacking Citrix Cloud Server
Hacking Citrix Cloud Server
 
Unblock all the Blocked sites in China
Unblock all the Blocked sites in ChinaUnblock all the Blocked sites in China
Unblock all the Blocked sites in China
 
6 Blessed Sayings of Holy Prophet Muhammad
6 Blessed Sayings of Holy Prophet Muhammad6 Blessed Sayings of Holy Prophet Muhammad
6 Blessed Sayings of Holy Prophet Muhammad
 
Understanding DNS Traffic Pattern
Understanding DNS Traffic Pattern Understanding DNS Traffic Pattern
Understanding DNS Traffic Pattern
 
Xen and Art of Virtualization (Xen Architecture)
Xen and Art of Virtualization (Xen Architecture)Xen and Art of Virtualization (Xen Architecture)
Xen and Art of Virtualization (Xen Architecture)
 
China Vs World
China Vs WorldChina Vs World
China Vs World
 
Virtualization, Cloud computing and OS Fingerprinting
Virtualization, Cloud computing and OS FingerprintingVirtualization, Cloud computing and OS Fingerprinting
Virtualization, Cloud computing and OS Fingerprinting
 
Interesting Email Services (Email Hacks)
Interesting Email Services  (Email Hacks)Interesting Email Services  (Email Hacks)
Interesting Email Services (Email Hacks)
 
The Mythical Man Month
The Mythical Man MonthThe Mythical Man Month
The Mythical Man Month
 
Google Hacking and Power Search Techniques
Google Hacking and Power Search TechniquesGoogle Hacking and Power Search Techniques
Google Hacking and Power Search Techniques
 
Facts you don’t know about pakistan
Facts you don’t know about pakistanFacts you don’t know about pakistan
Facts you don’t know about pakistan
 
Interesting email service’s
Interesting email service’sInteresting email service’s
Interesting email service’s
 

Recently uploaded

Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 

Recently uploaded (20)

Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 

Wiretapping

  • 2.
  • 3. • Introduction • What is sniffer • Sniffing Threats • How a sniffer Work • Type of Sniffing • Protocol vulnerable to sniffing • Tools to Sniff Network Traffic • How to setup a Sniffing Attack • How to protect your self from Sniffing • Tools to detect sniffer on a network
  • 4. Wire tapping is process of monitoring the Telephone and Internet conversation by third party. Type of Wiretapping
  • 5. A Sniffer is a packet-capturing or frame-capturing tool. It basically captures and displays the data as it is being transmitted from host to host on the network.
  • 6.
  • 7. A Sniffer turns the NIC of a system into Promiscuous(pro-mis-cu-os) mode so that it listen all the data transmitted on its segment. Sniffer can constantly Read all the information entering to the computer through NIC by Decoding the Information encapsulated in Data Packet.
  • 8. There are Two types of Sniffing Attack Active Sniffing Passive Sniffing
  • 9. “Passive Sniffing “mean sniffing trough a Hub. Passive Sniffing Involves sending no packets, and Monitoring the Packets sent by others. But Hub Usage is Outdated today.
  • 10. When Sniffing is performed on a Switched network, is known as “Active Sniffing”. Active Sniffing Relies on Injecting Packets (ARP) into the Network, that Cause traffic.
  • 11. Telnet and Rlogin HTTP SMTP NNTP POP FTP IMAP Keystrokes including User Name & Passwords Data sent in clear text Password and data sent in clear text Password and data sent in clear text
  • 12. SPAN Port is Port which is configure to Receive a Copy of Every Packet that passes through a Switch
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. Restrict the physical access to the network media to ensure that a packet sniffer cannot be installed Use Encryption to protect confidential information Permanently Add MAC address of the Gateway to ARP cache Use static IP Address and Static ARP tables to prevent attacker from adding the spoofed ARP entries for machines in the network
  • 28. Turn off network identification broadcasts and if possible restrict the network to authorized users in order to protect network form being with sniffing tools Use UPv6 instead of IPv4 protocol Use encrypted session such as SSJ instead of Telnet, Secure Copy (SCP) instead of FTP, SSL for E-mail connection, etc. to protect wireless network users against sniffing attack.
  • 29. Use Network Tools Such as HP Performance insight to monitor the network for strange Packets Use IDS Detect Promiscuous Mode