Menu
Home Explore People Places Arts History Plants & Animals Science Life & Culture Technology
On this page
Sniffing attack
𝐹𝑜𝑟 𝑠𝑜𝑚𝑒𝑜𝑛𝑒 𝑚𝑢𝑠𝑡 𝑎𝑛𝑎𝑙𝑦𝑠𝑖𝑠 𝑑𝑎𝑡𝑎 𝑡𝑜 𝑖𝑛𝑓𝑜𝑟𝑚𝑎𝑡𝑖𝑜𝑛 .

Sniffing attack in context of network security, corresponds to theft or interception of data by capturing the network traffic using a packet sniffer (an application aimed at capturing network packets). When data is transmitted across networks, if the data packets are not encrypted, the data within the network packet can be read using a sniffer. Using a sniffer application, an attacker can analyze the network and gain information to eventually cause the network to crash or to become corrupted, or read the communications happening across the network.

We don't have any images related to Sniffing attack yet.
We don't have any YouTube videos related to Sniffing attack yet.
We don't have any PDF documents related to Sniffing attack yet.
We don't have any Books related to Sniffing attack yet.
We don't have any archived web articles related to Sniffing attack yet.

General

Sniffing attacks can be compared to tapping of phone wires and get to know about the conversation, and for this reason, it is also referred as wiretapping applied to computer networks. Using sniffing tools, attackers can sniff sensitive information from a network, including email (SMTP, POP, IMAP), web (HTTP), FTP (Telnet authentication, FTP Passwords, SMB, NFS) and many more types of network traffic. The packet sniffer usually sniffs the network data without making any modifications in the network's packets. Packet sniffers can just watch, display, and log the traffic, and this information can be accessed by the attacker.3

Prevention

To prevent networks from sniffing attacks, organizations and individual users should keep away from applications that are using insecure protocols, like basic HTTP authentication, File Transfer Protocol (FTP), and Telnet. Instead, secure protocols such as HTTPS, Secure File Transfer Protocol (SFTP), and Secure Shell (SSH) should be preferred. In case there is a necessity for using any insecure protocol in any application, all the data transmission should be encrypted. If required, VPN (Virtual Private Networks) can be used to provide secure access to users.4

See also

References

  1. "Types of attacks - Sniffer Attack". Omnisecu.com. OmniSecu. Retrieved 11 September 2017. http://www.omnisecu.com/security/sniffer-attack.php

  2. "Common Types of Network Attacks". Technet.microsoft.com. Microsoft. 18 July 2012. Retrieved 11 September 2017. https://technet.microsoft.com/en-us/library/cc959354.aspx

  3. "Packet sniffing". Colasoft.com. Colasoft. Retrieved 11 September 2017. http://www.colasoft.com/resources/packet_sniffing.php

  4. "What is a Wireless Sniffer?". Veracode.com. Veracode. Retrieved 11 September 2017. https://www.veracode.com/security/wireless-sniffer