PUORG ENOTS DNA REVAF
Everything You Need To Know About Sniffing – Part 2 THIS BLOG ARTICLE IS POSTED BY
www.Info-savvy.com
Index topic
1. Vulnerable to sniffing 2. Sniffing within the data link Layer of the OSI Model 3. Hardware Protocol Analyzers 4. SPAN Port 5. Wiretapping 6. Types of Wiretapping 7. Lawful Interception
www.info-savvy.com
Vulnerable to sniffing The following protocols are vulnerable to sniffing. The most reason for vulnerable to Sniffing these protocols is to accumulate passwords:
Telnet and Rlogin HTTP SNMP POP FTP IMAP www.info-savvy.com
“We are changing the world With the Technology”
www.info-savvy.com
Sniffing within the data link Layer of the OSI Model The Open Systems Interconnection (OSI) model describes network functions as a series of severs layers. Each layer provides services to the layer above it and receives services from the layer below.
www.info-savvy.com
Hardware Protocol Analyzers
www.info-savvy.com
A hardware protocol analyzer may be a device that interprets traffic passing over a network. It captures signals without altering the traffic segment. Its purpose is to monitor network usage and identify malicious network traffic generated by hacking software installed on the network. It captures a data packet, decodes it, and analyzes its content consistent with predetermined rules. It allows an attacker to see the individual data bytes of every packet passing through the network.
80
www.info-savvy.com
“In Cyber Security the more systems we Secure,The more Secure We all are.” – Jeh Johnson
Types of Wiretapping There are two sorts of wiretapping that an attacker can use to watch, record, and even alter the info flow within the communication system.
Active Wiretapping
Passive Wiretapping
More infowww.info-savvy.com
https://www.info-savvy.com/everything-you-need-to-know-aboutsniffing-part-2/
Lawful Interception
Lawful interception refers to legally intercepting data communication between two endpoints for surveillance on the normal telecommunications, VoIP, data, and multi service networks. Lawful interception (LI) obtains data from a communication network for analysis or evidence; this is often useful in activities like infrastructure management and protection, also as cyber securityrelated issues. www.info-savvy.com
Social Media Links
Twitter https://www.instagram.com/infosavvy_
Facebook https://www.facebook.com/INF0SAVVY/
Instagram https://www.instagram.com/infosavvy_
www.info-savvy.com
Click here for continue reading...
https://www.info-savvy.com/everything-you-need-to-know-about-sniffing-part-2/
www.info-savvy.com
Reach Us
For questions or more info
ADDRESS
2nd Floor Sai NiketanOpp Borivali Railway StationBorivali West MumbaiMaharashtra 400092 PHONE NUMBER
99873 78932
www.info-savvy.com
THANK YOU www.info-savvy.com