SlideShare une entreprise Scribd logo
1  sur  64
MODULE 4 SNIFFERS
Objective ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Definition: Sniffing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protocols Vulnerable to Sniffing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tool: Network View – Scans the Network
The Dude Sniffer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Dude Sniffer - ScreenShot
The Dude Sniffer - ScreenShot
The Dude Sniffer - ScreenShot
Ethereal ,[object Object],[object Object],[object Object]
Display Filters in Ethereal ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Following the TCP Stream in Ethereal
Types of Sniffing
Passive Sniffing 􀁾  It is called passive because it is difficult to detect 􀁾 “ Passive sniffing” means sniffing through a hub 􀁾  Attacker simply connects the laptop to the hub and starts sniffing
Active Sniffing
What is Address Resolution Protocol?
ARP Spoofing Attack
How Does ARP Spoofing Work?
ARP Poisoning
Mac Duplicating ,[object Object],[object Object],[object Object],[object Object]
Mac Duplicating Attack
Tools for ARP Spoofing ,[object Object],[object Object],[object Object],[object Object]
Ettercap A tool for IP-based sniffing in a switched network, MAC-based sniffing, OS fingerprinting, ARP poisoning-based sniffing, ….
MAC Flooding ,[object Object],[object Object],[object Object],[object Object],[object Object]
Tools for MAC Flooding ,[object Object],[object Object],[object Object]
Windows Tool: EtherFlood
Threats of ARP Poisoning
Tool: Nemesis
Sniffer Hacking Tools (dsniff package) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sniffer Hacking Tools (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Linux Tool: Dsniff
Linux Tool: Filesnarf
Linux Tool: Mailsnarf
DNS Poisoning Techniques ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1.Intranet DNS Spoofing (Local Network) ,[object Object],[object Object]
2.Intranet DNS Spoofing (Remote Network)
Internet DNS Spoofing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3. Proxy Server DNS Poisoning
4. DNS Cache Poisoning ,[object Object],[object Object],[object Object],[object Object]
Interactive TCP Relay
Interactive Replay Attacks
HTTP Sniffer: EffeTech
HTTP Sniffer: EffeTech
Ace Password Sniffer
Ace Password Sniffer:   Screenshot
Win Sniffer
Session Capture Sniffer: NWreader
MSN Sniffer
MSN Sniffer: Screenshot
NetSetMan Tool ,[object Object],[object Object],[object Object]
EtherApe
EtherApe Features
Network Probe
Tool: Windump
CommView
CommView: Screenshot
How to Detect Sniffing? ,[object Object],[object Object],[object Object]
Countermeasures ,[object Object],[object Object],[object Object]
Countermeasures (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Countermeasures (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Countermeasures (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object]
AntiSniff Tool
ArpWatch Tool
PromiScan

Contenu connexe

Tendances

Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemMohit Belwal
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesamit kumar
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementMayur Nanotkar
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanningamiable_indian
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)Togis UAB Ltd
 
IPSec | Computer Network
IPSec | Computer NetworkIPSec | Computer Network
IPSec | Computer Networkshubham ghimire
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortDisha Bedi
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning Viren Rao
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 

Tendances (20)

Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanning
 
Network security
Network securityNetwork security
Network security
 
Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)
 
IPSec | Computer Network
IPSec | Computer NetworkIPSec | Computer Network
IPSec | Computer Network
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
 
Dmz
Dmz Dmz
Dmz
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 

En vedette

Spying The Wire
Spying The WireSpying The Wire
Spying The WireDon Anto
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LANArpit Suthar
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16mlrbrown
 
Ventajas de la biodiversidad
Ventajas de la biodiversidadVentajas de la biodiversidad
Ventajas de la biodiversidadCARRANZA41255782
 
Uk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineeringUk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineeringPublicLeaker
 
An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffingijcses
 
Sa Corp Presentation(6.17.09)
Sa Corp Presentation(6.17.09)Sa Corp Presentation(6.17.09)
Sa Corp Presentation(6.17.09)Dafna Shelly
 
Sun Pharma to acquire Ranbaxy in $4bn transaction says Sachin Karpe
Sun Pharma to acquire Ranbaxy in $4bn transaction says Sachin KarpeSun Pharma to acquire Ranbaxy in $4bn transaction says Sachin Karpe
Sun Pharma to acquire Ranbaxy in $4bn transaction says Sachin KarpeSachin Karpe
 

En vedette (20)

Spying The Wire
Spying The WireSpying The Wire
Spying The Wire
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LAN
 
Arp spoofing
Arp spoofingArp spoofing
Arp spoofing
 
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
 
Sniffer
SnifferSniffer
Sniffer
 
Sniffing via dsniff
Sniffing via dsniffSniffing via dsniff
Sniffing via dsniff
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Network sec 1
Network sec 1Network sec 1
Network sec 1
 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16
 
Protection contre l'ARP poisoning et MITM
Protection contre l'ARP poisoning et MITMProtection contre l'ARP poisoning et MITM
Protection contre l'ARP poisoning et MITM
 
Link Baiting
Link BaitingLink Baiting
Link Baiting
 
Day 2
Day 2Day 2
Day 2
 
Day 3
Day 3Day 3
Day 3
 
Ventajas de la biodiversidad
Ventajas de la biodiversidadVentajas de la biodiversidad
Ventajas de la biodiversidad
 
Uk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineeringUk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineering
 
An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffing
 
Sa Corp Presentation(6.17.09)
Sa Corp Presentation(6.17.09)Sa Corp Presentation(6.17.09)
Sa Corp Presentation(6.17.09)
 
DNS Cache Poisoning
DNS Cache PoisoningDNS Cache Poisoning
DNS Cache Poisoning
 
Sun Pharma to acquire Ranbaxy in $4bn transaction says Sachin Karpe
Sun Pharma to acquire Ranbaxy in $4bn transaction says Sachin KarpeSun Pharma to acquire Ranbaxy in $4bn transaction says Sachin Karpe
Sun Pharma to acquire Ranbaxy in $4bn transaction says Sachin Karpe
 
Chapter2
Chapter2Chapter2
Chapter2
 

Similaire à Module 5 Sniffers

Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffingBhavya Chawla
 
Hacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria GrunickHacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria Grunickamiable_indian
 
Unit 3:Enterprise Security
Unit 3:Enterprise SecurityUnit 3:Enterprise Security
Unit 3:Enterprise Securityprachi67
 
Internet security
Internet securityInternet security
Internet securitygohel
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptcemporku
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdftehkotak4
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinEslam Hussein
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer AttacksArun Modi
 
Lecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptxLecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptxAsmaaLafi1
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contestnkrafacyberclub
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisGTKlondike
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical HackerDavid Sweigert
 

Similaire à Module 5 Sniffers (20)

Ceh v5 module 07 sniffers
Ceh v5 module 07 sniffersCeh v5 module 07 sniffers
Ceh v5 module 07 sniffers
 
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffing
 
Hacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria GrunickHacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria Grunick
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Ettercap
EttercapEttercap
Ettercap
 
Unit 3:Enterprise Security
Unit 3:Enterprise SecurityUnit 3:Enterprise Security
Unit 3:Enterprise Security
 
Internet security
Internet securityInternet security
Internet security
 
Internet security
Internet securityInternet security
Internet security
 
Wiretapping
WiretappingWiretapping
Wiretapping
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.ppt
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
 
Intro To Hacking
Intro To HackingIntro To Hacking
Intro To Hacking
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam hussein
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer Attacks
 
Lecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptxLecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptx
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contest
 
6 networking
6 networking6 networking
6 networking
 
File000140
File000140File000140
File000140
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysis
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical Hacker
 

Plus de leminhvuong

Plus de leminhvuong (20)

Proxy
ProxyProxy
Proxy
 
Lession2 Xinetd
Lession2 XinetdLession2 Xinetd
Lession2 Xinetd
 
Module 7 Sql Injection
Module 7   Sql InjectionModule 7   Sql Injection
Module 7 Sql Injection
 
Iptables
IptablesIptables
Iptables
 
Lession1 Linux Preview
Lession1 Linux PreviewLession1 Linux Preview
Lession1 Linux Preview
 
Http
HttpHttp
Http
 
Dns
DnsDns
Dns
 
Net Admin Intro
Net Admin IntroNet Admin Intro
Net Admin Intro
 
Lession4 Dhcp
Lession4 DhcpLession4 Dhcp
Lession4 Dhcp
 
Lession3 Routing
Lession3 RoutingLession3 Routing
Lession3 Routing
 
Module 1 Introduction
Module 1   IntroductionModule 1   Introduction
Module 1 Introduction
 
Wire Less
Wire LessWire Less
Wire Less
 
Net Security Intro
Net Security IntroNet Security Intro
Net Security Intro
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
Module 4 Enumeration
Module 4   EnumerationModule 4   Enumeration
Module 4 Enumeration
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printing
 
Call Back
Call BackCall Back
Call Back
 
Module 1 Introduction
Module 1   IntroductionModule 1   Introduction
Module 1 Introduction
 

Module 5 Sniffers