Module 8. Sniffing
Packet sniffing is a process of monitoring and capturing all data packets passing through a given network using a software application or hardware device.
Last updated
Packet sniffing is a process of monitoring and capturing all data packets passing through a given network using a software application or hardware device.
Last updated
Packet sniffing allows a person to observe and access the entire network’s traffic from a given point. It monitors any bit of information entering or leaving the network. There are two types of sniffing: passive and active. Passive sniffing refers to sniffing on a hub-based network; active sniffing refers to sniffing on a switch-based network.
Although passive sniffing was once predominant, proper network-securing architecture has been implemented (switch-based network) to mitigate this kind of attack. However, there are a few loopholes in switch-based network implementation that can open doors for an attacker to sniff the network traffic.
Attackers hack the network using sniffers, where they mainly target the protocols vulnerable to sniffing. Some of these vulnerable protocols include HTTP, FTP, SMTP, POP, Telnet, IMAP, and NNTP. The sniffed traffic comprises data such as FTP and Telnet passwords, chat sessions, email and web traffic, and DNS traffic. Once attackers obtain such sensitive information, they might attempt to impersonate target user sessions.
Thus, an ethical hacker or pen tester needs to assess the security of the network’s infrastructure, find the loopholes in the network using various network auditing tools, and patch them up to ensure a secure network environment.
The labs in this module provide real-time experience in performing packet sniffing on the target network using various packet sniffing techniques and tools.
The objective of the lab is to perform network sniffing and other tasks that include, but are not limited to:
Sniff the network
Analyze incoming and outgoing packets for any attacks
Troubleshoot the network for performance
Secure the network from attacks