SlideShare una empresa de Scribd logo
1 de 64
MODULE 4 SNIFFERS
Objective ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Definition: Sniffing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protocols Vulnerable to Sniffing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tool: Network View – Scans the Network
The Dude Sniffer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Dude Sniffer - ScreenShot
The Dude Sniffer - ScreenShot
The Dude Sniffer - ScreenShot
Ethereal ,[object Object],[object Object],[object Object]
Display Filters in Ethereal ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Following the TCP Stream in Ethereal
Types of Sniffing
Passive Sniffing 􀁾  It is called passive because it is difficult to detect 􀁾 “ Passive sniffing” means sniffing through a hub 􀁾  Attacker simply connects the laptop to the hub and starts sniffing
Active Sniffing
What is Address Resolution Protocol?
ARP Spoofing Attack
How Does ARP Spoofing Work?
ARP Poisoning
Mac Duplicating ,[object Object],[object Object],[object Object],[object Object]
Mac Duplicating Attack
Tools for ARP Spoofing ,[object Object],[object Object],[object Object],[object Object]
Ettercap A tool for IP-based sniffing in a switched network, MAC-based sniffing, OS fingerprinting, ARP poisoning-based sniffing, ….
MAC Flooding ,[object Object],[object Object],[object Object],[object Object],[object Object]
Tools for MAC Flooding ,[object Object],[object Object],[object Object]
Windows Tool: EtherFlood
Threats of ARP Poisoning
Tool: Nemesis
Sniffer Hacking Tools (dsniff package) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sniffer Hacking Tools (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Linux Tool: Dsniff
Linux Tool: Filesnarf
Linux Tool: Mailsnarf
DNS Poisoning Techniques ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1.Intranet DNS Spoofing (Local Network) ,[object Object],[object Object]
2.Intranet DNS Spoofing (Remote Network)
Internet DNS Spoofing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3. Proxy Server DNS Poisoning
4. DNS Cache Poisoning ,[object Object],[object Object],[object Object],[object Object]
Interactive TCP Relay
Interactive Replay Attacks
HTTP Sniffer: EffeTech
HTTP Sniffer: EffeTech
Ace Password Sniffer
Ace Password Sniffer:   Screenshot
Win Sniffer
Session Capture Sniffer: NWreader
MSN Sniffer
MSN Sniffer: Screenshot
NetSetMan Tool ,[object Object],[object Object],[object Object]
EtherApe
EtherApe Features
Network Probe
Tool: Windump
CommView
CommView: Screenshot
How to Detect Sniffing? ,[object Object],[object Object],[object Object]
Countermeasures ,[object Object],[object Object],[object Object]
Countermeasures (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Countermeasures (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Countermeasures (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object]
AntiSniff Tool
ArpWatch Tool
PromiScan

Más contenido relacionado

La actualidad más candente

Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
 
Application Security
Application SecurityApplication Security
Application Securityflorinc
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptNitesh Dubey
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingAnurag Srivastava
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
 
Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application SecurityRob Ragan
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesrahul kundu
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service AttackDhrumil Panchal
 
Web application attacks
Web application attacksWeb application attacks
Web application attackshruth
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksSam Bowne
 

La actualidad más candente (20)

Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Application Security
Application SecurityApplication Security
Application Security
 
Social Engineering.pdf
Social Engineering.pdfSocial Engineering.pdf
Social Engineering.pdf
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Banner grabbing
Banner grabbingBanner grabbing
Banner grabbing
 
Man in the middle
Man in the middleMan in the middle
Man in the middle
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
Network Security
Network SecurityNetwork Security
Network Security
 
Arp spoofing
Arp spoofingArp spoofing
Arp spoofing
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application Security
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slides
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service Attack
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
 

Destacado

Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning Viren Rao
 
Spying The Wire
Spying The WireSpying The Wire
Spying The WireDon Anto
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LANArpit Suthar
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16mlrbrown
 
Ventajas de la biodiversidad
Ventajas de la biodiversidadVentajas de la biodiversidad
Ventajas de la biodiversidadCARRANZA41255782
 
Uk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineeringUk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineeringPublicLeaker
 
An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffingijcses
 
Sa Corp Presentation(6.17.09)
Sa Corp Presentation(6.17.09)Sa Corp Presentation(6.17.09)
Sa Corp Presentation(6.17.09)Dafna Shelly
 
Sun Pharma to acquire Ranbaxy in $4bn transaction says Sachin Karpe
Sun Pharma to acquire Ranbaxy in $4bn transaction says Sachin KarpeSun Pharma to acquire Ranbaxy in $4bn transaction says Sachin Karpe
Sun Pharma to acquire Ranbaxy in $4bn transaction says Sachin KarpeSachin Karpe
 

Destacado (20)

Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning
 
Spying The Wire
Spying The WireSpying The Wire
Spying The Wire
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LAN
 
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
 
Sniffer
SnifferSniffer
Sniffer
 
Sniffing via dsniff
Sniffing via dsniffSniffing via dsniff
Sniffing via dsniff
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Network sec 1
Network sec 1Network sec 1
Network sec 1
 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16
 
Protection contre l'ARP poisoning et MITM
Protection contre l'ARP poisoning et MITMProtection contre l'ARP poisoning et MITM
Protection contre l'ARP poisoning et MITM
 
Link Baiting
Link BaitingLink Baiting
Link Baiting
 
Day 2
Day 2Day 2
Day 2
 
Day 3
Day 3Day 3
Day 3
 
Ventajas de la biodiversidad
Ventajas de la biodiversidadVentajas de la biodiversidad
Ventajas de la biodiversidad
 
Uk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineeringUk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineering
 
An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffing
 
Sa Corp Presentation(6.17.09)
Sa Corp Presentation(6.17.09)Sa Corp Presentation(6.17.09)
Sa Corp Presentation(6.17.09)
 
DNS Cache Poisoning
DNS Cache PoisoningDNS Cache Poisoning
DNS Cache Poisoning
 
Sun Pharma to acquire Ranbaxy in $4bn transaction says Sachin Karpe
Sun Pharma to acquire Ranbaxy in $4bn transaction says Sachin KarpeSun Pharma to acquire Ranbaxy in $4bn transaction says Sachin Karpe
Sun Pharma to acquire Ranbaxy in $4bn transaction says Sachin Karpe
 

Similar a Module 5 Sniffers

Hacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria GrunickHacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria Grunickamiable_indian
 
Unit 3:Enterprise Security
Unit 3:Enterprise SecurityUnit 3:Enterprise Security
Unit 3:Enterprise Securityprachi67
 
Internet security
Internet securityInternet security
Internet securitygohel
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptcemporku
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdftehkotak4
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinEslam Hussein
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer AttacksArun Modi
 
Lecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptxLecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptxAsmaaLafi1
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contestnkrafacyberclub
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisGTKlondike
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical HackerDavid Sweigert
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanningleminhvuong
 

Similar a Module 5 Sniffers (20)

Ceh v5 module 07 sniffers
Ceh v5 module 07 sniffersCeh v5 module 07 sniffers
Ceh v5 module 07 sniffers
 
Hacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria GrunickHacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria Grunick
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Ettercap
EttercapEttercap
Ettercap
 
Unit 3:Enterprise Security
Unit 3:Enterprise SecurityUnit 3:Enterprise Security
Unit 3:Enterprise Security
 
Internet security
Internet securityInternet security
Internet security
 
Internet security
Internet securityInternet security
Internet security
 
Wiretapping
WiretappingWiretapping
Wiretapping
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.ppt
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
 
Intro To Hacking
Intro To HackingIntro To Hacking
Intro To Hacking
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam hussein
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer Attacks
 
Lecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptxLecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptx
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contest
 
6 networking
6 networking6 networking
6 networking
 
File000140
File000140File000140
File000140
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysis
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical Hacker
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
 

Más de leminhvuong

Más de leminhvuong (20)

Proxy
ProxyProxy
Proxy
 
Lession2 Xinetd
Lession2 XinetdLession2 Xinetd
Lession2 Xinetd
 
Module 7 Sql Injection
Module 7   Sql InjectionModule 7   Sql Injection
Module 7 Sql Injection
 
Iptables
IptablesIptables
Iptables
 
Lession1 Linux Preview
Lession1 Linux PreviewLession1 Linux Preview
Lession1 Linux Preview
 
Http
HttpHttp
Http
 
Dns
DnsDns
Dns
 
Net Admin Intro
Net Admin IntroNet Admin Intro
Net Admin Intro
 
Lession4 Dhcp
Lession4 DhcpLession4 Dhcp
Lession4 Dhcp
 
Lession3 Routing
Lession3 RoutingLession3 Routing
Lession3 Routing
 
Module 1 Introduction
Module 1   IntroductionModule 1   Introduction
Module 1 Introduction
 
Wire Less
Wire LessWire Less
Wire Less
 
Net Security Intro
Net Security IntroNet Security Intro
Net Security Intro
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
 
Module 6 Session Hijacking
Module 6   Session HijackingModule 6   Session Hijacking
Module 6 Session Hijacking
 
Module 4 Enumeration
Module 4   EnumerationModule 4   Enumeration
Module 4 Enumeration
 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printing
 
Call Back
Call BackCall Back
Call Back
 

Module 5 Sniffers