Everything You Need To Know About Sniffing – Part 2

Page 1

P U O R G

Everything You Need To Know About Sniffing – Part 2 E

N O T S D

N A R E

V A F

THIS B L O G ARTICLE IS P O S T E D B Y

www.Info-savvy.com


Index topic 1. 2. 3. 4. 5. 6. 7.

Vulnerable to sniffing Sniffing within the data link Layer of the OSI Model Hardware Protocol Analyzers SPAN Port Wiretapping Types of Wiretapping Lawful Interception

www.info-savvy.com


Vulnerable to sniffing The following protocols are vulnerable to sniffing . The most reason for vulnerable to Sniffing these protocols is to accumulate passwords :

www.info-savvy.com

Telnet and Rlogin HTTP SNM P POP FTP IMAP


“We are changing the world With the Technology”

www.info-savvy.com


Sniffing within the data link Layer of the OSI Model The Open Systems Interconnection (OSI) model describes network f u nc t ion s as a series of severs layers. Each layer p r o v ide s services to the layer above it and receives services f r om the layer below.

www.info-savvy.com


Hardware Protocol Analyzers

A ha r d w a r e p r o t ocol anal yz e r ma y be a de vice that in t e r p r e ts tr affic pa ss ing o v e r a ne tw o rk . It cap tur e s s ignal s w it ho ut altering the tr affic segment. Its p ur po s e i s to moni t o r ne tw o r k usage and iden t if y malicio us ne tw o r k tr affic generated b y hacking s of tw a r e in st alled on the ne tw o r k . It cap tur e s a data packet, decode s it, and anal yz e s i ts content con s i st en t with p r ede t e r mined ru le s . It allo ws an attacker to see the indi v id u al data b yt e s of e ve ry packet pa ss ing t h r o u gh the ne tw o r k .

www.info-savvy.com


www.info-savvy.com

“In Cyber Security the more systems we Secure,The more Secure We all are.” – Jeh Johnson 8 0


Types of Wiretapping There are two s o rts of wire tapping that an attacker can us e to w a t ch , r eco r d , and even alter the info flo w w i t hin the comm u nica t ion syst em .

Ac tive W i r etappin

Pa ss i v e W i r etappin g

g Mo r e info www.info-savvy.com

https://www.info-savvy.com/everything-you-need-to-know-about- s niffing-part-2/


Lawful Interception La w f u l in t e r cep t ion r efe rs to legall y in t e r cep t ing data comm u nica t ion between two endpoin ts fo r surv eillance on the no r mal t elecomm u nica t ion s , VoIP, data, and m u l t i s e rv ice ne tw o r k s . La w f u l in t e r cep t ion (LI) ob t ain s data

f r om a comm u nica t ion ne tw o r k fo r anal ys i s o r ev idence ; t hi s i s of t en us ef u l in ac t i v i t ie s like inf r a stru c tur e managemen t and p r ot ec t ion , al s o a s c y be r s ec ur i ty rela t ed i ssu e s . www.info-savvy.com


Social Media Links

Twitter https://www.instagram.com/infosavvy_ Facebook https://www.facebook.com/INF0SAVVY/

Instagram https://www.instagram.com/infosavvy_

www.info-savvy.com


Click here for continue reading… https://www.info-savvy.com/everything-you-need-to-know-about-sniffing-part-2/

www.info-savvy.com


Reach Us For questions or more info

ADDRESS 2nd Floor Sai NiketanOpp Borivali Railway StationBorivali West MumbaiMaharashtra 400092 PHONE NUMBER

99873 78932 www.info-savvy.com


THANK YOU www.info-savvy.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.