P U O R G
Everything You Need To Know About Sniffing – Part 2 E
N O T S D
N A R E
V A F
THIS B L O G ARTICLE IS P O S T E D B Y
www.Info-savvy.com
Index topic 1. 2. 3. 4. 5. 6. 7.
Vulnerable to sniffing Sniffing within the data link Layer of the OSI Model Hardware Protocol Analyzers SPAN Port Wiretapping Types of Wiretapping Lawful Interception
www.info-savvy.com
Vulnerable to sniffing The following protocols are vulnerable to sniffing . The most reason for vulnerable to Sniffing these protocols is to accumulate passwords :
www.info-savvy.com
Telnet and Rlogin HTTP SNM P POP FTP IMAP
“We are changing the world With the Technology”
www.info-savvy.com
Sniffing within the data link Layer of the OSI Model The Open Systems Interconnection (OSI) model describes network f u nc t ion s as a series of severs layers. Each layer p r o v ide s services to the layer above it and receives services f r om the layer below.
www.info-savvy.com
Hardware Protocol Analyzers
A ha r d w a r e p r o t ocol anal yz e r ma y be a de vice that in t e r p r e ts tr affic pa ss ing o v e r a ne tw o rk . It cap tur e s s ignal s w it ho ut altering the tr affic segment. Its p ur po s e i s to moni t o r ne tw o r k usage and iden t if y malicio us ne tw o r k tr affic generated b y hacking s of tw a r e in st alled on the ne tw o r k . It cap tur e s a data packet, decode s it, and anal yz e s i ts content con s i st en t with p r ede t e r mined ru le s . It allo ws an attacker to see the indi v id u al data b yt e s of e ve ry packet pa ss ing t h r o u gh the ne tw o r k .
www.info-savvy.com
www.info-savvy.com
“In Cyber Security the more systems we Secure,The more Secure We all are.” – Jeh Johnson 8 0
Types of Wiretapping There are two s o rts of wire tapping that an attacker can us e to w a t ch , r eco r d , and even alter the info flo w w i t hin the comm u nica t ion syst em .
Ac tive W i r etappin
Pa ss i v e W i r etappin g
g Mo r e info www.info-savvy.com
https://www.info-savvy.com/everything-you-need-to-know-about- s niffing-part-2/
Lawful Interception La w f u l in t e r cep t ion r efe rs to legall y in t e r cep t ing data comm u nica t ion between two endpoin ts fo r surv eillance on the no r mal t elecomm u nica t ion s , VoIP, data, and m u l t i s e rv ice ne tw o r k s . La w f u l in t e r cep t ion (LI) ob t ain s data
f r om a comm u nica t ion ne tw o r k fo r anal ys i s o r ev idence ; t hi s i s of t en us ef u l in ac t i v i t ie s like inf r a stru c tur e managemen t and p r ot ec t ion , al s o a s c y be r s ec ur i ty rela t ed i ssu e s . www.info-savvy.com
Social Media Links
Twitter https://www.instagram.com/infosavvy_ Facebook https://www.facebook.com/INF0SAVVY/
Instagram https://www.instagram.com/infosavvy_
www.info-savvy.com
Click here for continue reading… https://www.info-savvy.com/everything-you-need-to-know-about-sniffing-part-2/
www.info-savvy.com
Reach Us For questions or more info
ADDRESS 2nd Floor Sai NiketanOpp Borivali Railway StationBorivali West MumbaiMaharashtra 400092 PHONE NUMBER
99873 78932 www.info-savvy.com
THANK YOU www.info-savvy.com