Sniffing Eavesdropping
Sniffing Eavesdropping
Introduction
Sniffing and eavesdropping refer to the unauthorized interception of data as it
travels across a network. This can include various forms of communication, such
as emails, instant messages, and other data transmitted over the internet. The
primary goal of sniffing is to capture and analyse this data, often with malicious
intent, such as stealing sensitive information, login credentials, or confidential
business data.
Sniffing attacks are data thefts perpetrated by capturing network traffic with
packet sniffers, which can illegally access and read unencrypted data. The data
packets are collected when they pass through a computer network. The sniffing
devices or media used to perform this sniffing attack and collect network data
packets are known as packet sniffers.
How does packet sniffing work?
Network Interface in Promiscuous Mode:
Capturing Packets:
Packet Decoding:
• Once the packets are captured, the packet sniffing tool decodes the data
within each packet.
• The packet header contains information such as source and destination
addresses, packet type, and other metadata.
• The payload contains the actual data being transmitted, such as text,
images, or other application-specific information.
Analysis and Filtering:
• The packet sniffing tool provides users with the ability to filter and analyse
the captured packets based on various criteria.
• Users can focus on specific types of traffic, filter by source or destination
IP addresses, and even search for keywords within the packet payload.
The act of sniffing can be classified into two types: active and passive.
Passive Sniffing:
Active Sniffing:
As the name implies, its purpose is to obtain the victim’s password. Password
sniffing is a man-in-the-middle (MITM) cyberattack in which a hacker breaches
the connection and then steals the user’s password.
Session hijacking takes over a web user session by secretly collecting the session
ID and masquerading as the authorized user. Once the attacker has gained the
user’s session ID, he or she can masquerade as that user and do anything the
user is allowed to do on the network.
DNS poisoning
In a JavaScript sniffing attack, the attacker injects lines of code onto a website,
which subsequently harvests personal information entered by users into online
forms: generally, online store payment forms. Credit card numbers, names,
addresses, passwords, and phone numbers are the most targeted user data.
Poisoning of ARP refers to the technique of delivering false ARP messages across
a local area network (LAN). These attacks are designed to reroute traffic away
from their intended destination and towards an attacker.
Tools Used for Sniffing
Wireshark
Tcpdump
VPNs create secure and encrypted tunnels for data transmission over the
internet. By using VPNs, individuals and organizations can enhance the
confidentiality and integrity of their data, preventing unauthorized
eavesdropping.
Network Segmentation
Dividing a network into segments or VLANs (Virtual Local Area Networks) can
limit the scope of sniffing attacks. It adds an additional layer of protection by
isolating sensitive data and reducing the potential impact of an intrusion.
Deploying IDS and IPS tools can help detect and prevent unauthorized access
and malicious activities on a network. These systems can identify unusual
patterns in network traffic indicative of sniffing attempts and take appropriate
action.
Frequent network audits and monitoring can help identify any unusual or
suspicious activities. By monitoring network traffic and system logs, one can
detect and respond to potential sniffing attempts in a timely manner.
References
https://www.spiceworks.com/it-security/network-security/articles/what-is-
packet-sniffing/
https://intellipaat.com/blog/tutorial/ethical-hacking-cyber-security-
tutorial/sniffing-attacks
https://www.geeksforgeeks.org/what-is-sniffing-attack-in-system-hacking/
https://cisomag.com/what-are-sniffing-attacks-and-how-to-defend-against-
them/
https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_sniffing.htm