Everything You Need To Know About Sniffing – Part 2

Page 1

PUORG ENOTS DNA REVAF

Everything You Need To Know About Sniffing – Part 2 THIS BLOG ARTICLE IS POSTED BY

www.Info-savvy.com


Index topic

1. Vulnerable to sniffing 2. Sniffing within the data link Layer of the OSI Model 3. Hardware Protocol Analyzers 4. SPAN Port 5. Wiretapping 6. Types of Wiretapping 7. Lawful Interception

www.info-savvy.com


Vulnerable to sniffing The following protocols are vulnerable to sniffing. The most reason for vulnerable to Sniffing these protocols is to accumulate passwords:

Telnet and Rlogin HTTP SNMP POP FTP IMAP www.info-savvy.com


“We are changing the world With the Technology”

www.info-savvy.com


Sniffing within the data link Layer of the OSI Model The Open Systems Interconnection (OSI) model describes network functions as a series of severs layers. Each layer provides services to the layer above it and receives services from the layer below.

www.info-savvy.com


Hardware Protocol Analyzers

www.info-savvy.com

A hardware protocol analyzer may be a device that interprets traffic passing over a network. It captures signals without altering the traffic segment. Its purpose is to monitor network usage and identify malicious network traffic generated by hacking software installed on the network. It captures a data packet, decodes it, and analyzes its content consistent with predetermined rules. It allows an attacker to see the individual data bytes of every packet passing through the network.


80

www.info-savvy.com

“In Cyber Security the more systems we Secure,The more Secure We all are.” – Jeh Johnson


Types of Wiretapping There are two sorts of wiretapping that an attacker can use to watch, record, and even alter the info flow within the communication system.

Active Wiretapping

Passive Wiretapping

More infowww.info-savvy.com

https://www.info-savvy.com/everything-you-need-to-know-aboutsniffing-part-2/


Lawful Interception

Lawful interception refers to legally intercepting data communication between two endpoints for surveillance on the normal telecommunications, VoIP, data, and multi service networks. Lawful interception (LI) obtains data from a communication network for analysis or evidence; this is often useful in activities like infrastructure management and protection, also as cyber securityrelated issues. www.info-savvy.com


Social Media Links

Twitter https://www.instagram.com/infosavvy_

Facebook https://www.facebook.com/INF0SAVVY/

Instagram https://www.instagram.com/infosavvy_

www.info-savvy.com


Click here for continue reading...

https://www.info-savvy.com/everything-you-need-to-know-about-sniffing-part-2/

www.info-savvy.com


Reach Us

For questions or more info

ADDRESS

2nd Floor Sai NiketanOpp Borivali Railway StationBorivali West MumbaiMaharashtra 400092 PHONE NUMBER

99873 78932

www.info-savvy.com


THANK YOU www.info-savvy.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.