Packet Sniffers - PowerPoint PPT Presentation

1 / 9
About This Presentation
Title:

Packet Sniffers

Description:

... uses a network adapter card in promiscuous mode to capture all network packets. ... Packet sniffers exploit information passed in clear text. ... – PowerPoint PPT presentation

Number of Views:41
Avg rating:3.0/5.0
Slides: 10
Provided by: ameral
Category:

less

Transcript and Presenter's Notes

Title: Packet Sniffers


1
Packet Sniffers
Prepared By Amer Alhorini Supervised By Dr.
Lo'ai Tawalbeh NYIT New York Institute of
Technology
2
The Network Today
3
Packet Sniffers
Host A
Host B
Router A
Router B
  • A packet sniffer is a software application that
    uses a network adapter card in promiscuous mode
    to capture all network packets. The following are
    the packet sniffer features
  • Packet sniffers exploit information passed in
    clear text. Protocols that pass information in
    the clear include the following
  • Telnet
  • FTP
  • SNMP
  • POP
  • Packet sniffers must be on the same collision
    domain.

4
Packet Sniffer Mitigation
Host A
Host B
Router A
Router B
  • The following techniques and tools can be used to
    mitigate sniffers
  • AuthenticationUsing strong authentication, such
    as one-time passwords, is a first option for
    defense against packet sniffers.
  • Switched infrastructureDeploy a switched
    infrastructure to counter the use of packet
    sniffers in your environment.
  • Antisniffer toolsUse these tools to employ
    software and hardware designed to detect the use
    of sniffers on a network.
  • CryptographyThe most effective method for
    countering packet sniffers does not prevent or
    detect packet sniffers, but rather renders them
    irrelevant.

5
Trends that Affect Security
  • Increase of network attacks
  • Increased sophistication of attacks
  • Increased dependence on the network
  • Lack of trained personnel
  • Lack of awareness
  • Lack of security policies
  • Wireless access
  • Legislation
  • Litigation

6
Network Threats Attack Examples
  • There are four general categories of security
    threats to the network
  • Unstructured threats
  • Structured threats
  • External threats
  • Internal threats

Internal exploitation
Dial-in exploitation
External exploitation
Compromised host
7
Four Classes of Network Attacks
  • Reconnaissance attacks
  • Access attacks
  • Denial of service attacks
  • Worms, viruses, and Trojan horses

8
Specific Attack Types
  • All of the following can be used to compromise
    your system
  • Packet sniffers
  • IP weaknesses
  • Password attacks
  • DoS or DDoS
  • Man-in-the-middle attacks
  • Application layer attacks
  • Trust exploitation
  • Port redirection
  • Virus
  • Trojan horse
  • Operator error
  • Worms

9
Reconnaissance Attack Example
  • Sample IP address query

Sample domain name query
Write a Comment
User Comments (0)
About PowerShow.com