Network Sniffing - Salem73616C656D/reading-notes GitHub Wiki

Key Takeaways

Why Sniff?

  • Getting Credentials
  • Stealing Bank/Transaction Information
  • Spying On Message/Email Traffic
  • Identity Theft
  • Network Surveillance

Passive Sniffing

  • This kind of sniffing occurs at the hub. A hub is a device that received the traffic on one port and then retransmits that traffic on all other ports. It does not take into account that the traffic is not meant for other destinations. In this case, if a sniffer device is placed at the hub then all the network traffic can be directly captured by the sniffer. The sniffer can sit there undetected for a long time and spy on the network. Since hubs are not used these days much, this kind of attack will be an old-school trick to perform. Hubs are being replaced by switches and that is where active sniffing comes into the picture.

Active Sniffing

  • In a nutshell, a switch learns a CAM table that has the mac addresses of the destinations. Basis this table the switch is able to decide what network packet is to be sent where. In active sniffing, the sniffer will flood the switch with bogus requests so that the CAM table gets full. Once the CAM is full the switch will act as a switch and send the network traffic to all ports. Now, this is legitimate traffic that gets distributed to all the ports. This way the attacker can sniff the traffic from the switch.

Top Tools

  • WireShark
  • dSniff
  • Debookee

Vocabulary

Sniffing

  • intercepting and logging network traffic for the purpose of analysis