A sniffer is a packet-capturing or frame-capturing tool. It basically captures and displays the data as it is being transmitted from host to host on the network. Generally a sniffer intercepts traffic on the network and displays it in either a command-line or GUI format for a hacker to view. Most sniffers display both the Layer 2 (frame) or Layer 3 (packet) headers and the data payload. Some sophisticated sniffers interpret the packets and can reassemble the packet stream into the original data, such as an email or a document. Sniffers are used to capture traffic sent between two systems, but they can also provide a lot of other information. Depending on how the sniffer is used and the security measures in place, a hacker can use a sniffer to discover usernames, passwords, and other confidential information transmitted on the network. Several hacking attacks and various hacking tools require the use of a sniffer to obtain important information sent from the target system. This chapter will describe how sniffers work and identify the most common sniffer hacking tools.
Saturday, May 11, 2013
Subscribe to:
Post Comments (Atom)
Search
Contents
-
▼
2013
(23)
-
▼
May
(19)
- SQL Injection
- The Purpose of SQL Injection
- Rogue Access Points
- Wireless Hacking Techniques
- Securing Home Wireless Networks
- Linux System
- How ARP Works
- How a Sniffer Works
- Gathering Data from Networks: Sniffers
- Types Of Computer Virus
- Land Attacks,Smurf Attacks,UDP Flooding
- Distributed DOS Attacks
- SYN Attack
- Teardrop
- Ping Of Death
- DOS Attacked
- Movie Download Site List
- ShellCode HandBook Download
- What is Google+ (Google Plus) and do I need it?
-
▼
May
(19)
Visitor
Powered by Blogger.
0 comments:
Post a Comment
Thank You For Comment...