Preview

Network Sniffing

Satisfactory Essays
Open Document
Open Document
435 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Sniffing
Network Security (Packet Sniffing)

Outline
  
 

Packet sniffing Sniffing in Hub Sniffing in Switch
ARP (Address Resolution Protocol) ARP Spoofing



Conclusion

Packet Sniffing Overview




Process of monitoring a network to gather information that may be useful Use by both “good guys” and “bad guys”

Sniffing in Hub




A sends a packet to D All stations will receive the packet including the Sniffer station
A B

Sniffer

Hub

C

D

Sniffing in Switch






A sends a packet to D Switch looks up its table and only sends the packet to D Sniffer station will not receive the packet Can switch be used to prevent sniffing?
A B

Sniffer

Switch



C

D

Address Resolution Protocol (ARP)
 





MAC address needed for data communication ARP helps to provide a dynamic mapping of a 32bit IP address to a 48-bit MAC address The source station checks its ARP cache and if the MAC address of the destination station is not there it sends out an ARP broadcast message to find the destination station The destination station will respond to the ARP request with its MAC address

ARP (cont’d)

I need the MAC address of 192.168.1.4

Broadcast

Switch

IP: 192.168.1.4 MAC: 00:11:00:02:33:d0

B A C D 192.168.1.1 192.168.1.2 192.168.1.3 192.168.1.4

Host Broadcasts for another Host MAC address

ARP Spoofing
 

ARP Poisoning Introducing a fake IP - MAC address mapping in another host’s ARP cache


e.g. ARP Unsolicited Responses

ARP Unsolicited Responses
I have 192.168.1.4 My MAC is 00:11:00:02:33:aa Attacker ARP Replies IP: 192.168.1.103

Switch

A 192.168.1.1

B

C

D 192.168.1.4 00:11:00:02:33:d0

192.168.1.4 00:11:00:02:33:aa

Sniffing in switch using APR Spoofing
3) Send the spoofed ARP packet from Attacker with an arpredirect 1) Turn on IP forwarding to forward traffic 2) Run packet analyzer Attacker IP: 192.168.1.103

4) Now all traffic from A

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 7 Exercise 1

    • 489 Words
    • 2 Pages

    The proposed method is illustrated as a flow chart in Fig 3. First, the source node broadcast the RREQ to neighbor nodes. The neighbor nodes forward the Route Request (RREQ) to the destination node. Destination node stores the neighbor RREQ in a table and checks the RREQ. If RREQ is from the true Source node address, then the system is regular and begins to transmit test data packets otherwise repeat the process. Next, it will check the packet delivery ratio if packet delivery ratio drops to threshold then Send Bait RREQ. The source node randomly chooses one-hop neighbor node (nr) as a destination node. The Source node selects one-hop neighbor node nr as the destination node and sends the RREQ to that node. First, if nr had not launched black hole attack, then after the source node had sent the RREQ, then other nodes in addition to nr node also reply with RREP. It indicates that there is an Attacker in Reply routing. If the only nr sent RREP then…

    • 489 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    From the information contained in the ARP reply, write down the MAC address of the default gateway.…

    • 434 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ARP test: It also uses ARP (address resolution protocol) test, in ARP cache it checks the 10 recently learned entries in the memory. Then it sends an ARP request from cache entries, if the traffic is received in 5 seconds of time interval it consider the firewall is operational. If no traffic is received then its sends ARP request to the next entire of the cache. Likewise it checks all 10 entries in ARP cache, if not…

    • 480 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    Investigator provides security operations staff, auditors, and fraud and forensics investigators the power to perform unprecedented free-form contextual analysis of raw network data captured and reconstructed…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 5 Lab JM

    • 625 Words
    • 5 Pages

    2. If not found build ARP request frame containing MAC address, IP Address, and forwarding IP address.…

    • 625 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    The key to this question is that ARP is a layer 2 protocol. Since it is a layer 2 protocol, it can route to anything within the same network. In this case, only the hosts are in the same network, so we can only ARP poison the hosts. Node4 is subnetted,…

    • 2570 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    This is beneficial for the network and the switch since the switch has memory and can handle additional than one piece of data packet. The data packet packets are read by the switch and sends the data packet only to the MAC address that the data packet is filled out for that MAC. That saves the bandwidth by not using all the wire sending un-needed data packet across.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    Computer A is trying to send information to Computer B, the IP address must see the advertisement from Computer B for the router to know where to send the information. The router then…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    netw 240 week 7

    • 330 Words
    • 3 Pages

    What is the MAC (Physical) address of the Host requesting the MAC address of the default gateway (router)?…

    • 330 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 4 Assignment

    • 1851 Words
    • 8 Pages

    Provide a short summary (including the name) and details of the contribution that each of the following organizations have played in facilitating effective data communication. Summarize the types of standards that would be found at each organization and map those to the layered model used by Kurose Ross.…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    There are a number of techniques and processes available when carrying out a Passive Information Gathering exercise. A lot of important information can be passively harvested and subsequently used in a direct attack or to reinforce other attacks targeted at an organization. Depending upon the source, information such as current service patching levels, internal network…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 349 Words
    • 1 Page

    IP routing: The process of forwarding an IP packet from end to end through a TCP/IP network, as well as the logic used on an individual host or router as its part of the forwarding of the packet to its end destination.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    How can social engineering be used to gather information or data about the organizations’ IT Infrastructure?…

    • 283 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    4. How can social engineering be used to gather information or data about the organization’s IT infrastructure?…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Monitor – Scan environment for information, actively contact others for information and receive unsolicited information…

    • 6662 Words
    • 27 Pages
    Good Essays