Explore chapters and articles related to this topic
Network Threats
Published in Nicholas Kolokotronis, Stavros Shiaeles, Cyber-Security Threats, Actors, and Dynamic Mitigation, 2021
Panagiotis Radoglou Grammatikis, Panagiotis Sarigiannidis
A passive network traffic analysis attack includes the capturing and analysis of the network packets exchanged in a network. In particular, this kind of attack requires the attacker to enable the promiscuous mode of the Network Interface Controller (NIC) in order to not ignore those packets that are not destined to the attacking machine. There are many software applications that can be used for implementing this attack, such as Wireshark [18], Tcpdump [19], and Scapy [20]. More specifically, these applications are composed of two main elements called: (a) sniffer and (b) protocol analyzer. The sniffer undertakes to capture and copy the network traffic, while the protocol analyzer decodes, processes, and analyses the various packets.
Cyber Security Techniques, Architectures, and Design
Published in Shashi Bhushan, Manoj Kumar, Pramod Kumar, Renjith V. Ravi, Anuj Kumar Singh, Holistic Approach to Quantum Cryptography in Cyber Security, 2023
Sita Rani, Aman Kataria, Meetali Chauhan
In sniffer attacks, a sniffer application or device is used which reads, monitors, as well as captures network data packets. Unauthorized sniffers are very harmful to the systems as they can't be detected easily but can be inserted anywhere. A sniffer provides the full view of nonencrypted data packets. If the packets are not encrypted, they can be read without having any access key. Sensitive information such as passwords, email, and account information can be easily captured with sniffing. Figure 3.17 shows the sniffer attack where the hacker is able to access sensitive information using a device on the system.
Troubleshooting
Published in Steve Church, Skip Pizzi, Audio Over IP, 2012
WireShark is the current PC-based sniffer champion, available on both Windows and Linux (Figure 8.7). It is free and available at www.wireshark.org. It has all the features you need for basic work. You can set filters to limit the capture to the specific data you need to see, make timestamps, start capture on various trigger conditions, and more. Data can be recorded to a file for later analysis.
AI-enabled IoT penetration testing: state-of-the-art and research challenges
Published in Enterprise Information Systems, 2023
Claudia Greco, Giancarlo Fortino, Bruno Crispo, Kim-Kwang Raymond Choo
- Wireshark is a network sniffer that allows network traffic analysis by capturing data packets and enabling one to examine their traits (e.g., what protocol is used). Thus, it helps one to interpret the content of the communication between client and server at various levels.