SlideShare a Scribd company logo
1 of 10
Packet Sniffers



         Prepared By:
         Amer Alhorini


        Supervised By:
       Dr. Lo'ai Tawalbeh

             NYIT
New York Institute of Technology




                                   1
The Network Today




                    2
Packet Sniffers

 Host A                                                                  Host B
                 Router A                              Router B




• A packet sniffer is a software application that uses a network adapter card
  in promiscuous mode to capture all network packets. The following are the
  packet sniffer features:
     Packet sniffers exploit information passed in clear text. Protocols that pass
     information in the clear include the following:
          •Telnet
          •FTP
          •SNMP
          •POP
     Packet sniffers must be on the same collision domain.



                                                                                     3
Packet Sniffer Mitigation

 Host A                                                               Host B
              Router A                               Router B




• The following techniques and tools can be used to mitigate sniffers:
     Authentication—Using strong authentication, such as one-time passwords, is a first
     option for defense against packet sniffers.
     Switched infrastructure—Deploy a switched infrastructure to counter the use of
     packet sniffers in your environment.
     Antisniffer tools—Use these tools to employ software and hardware designed to
     detect the use of sniffers on a network.
     Cryptography—The most effective method for countering packet sniffers does not
     prevent or detect packet sniffers, but rather renders them irrelevant.




                                                                                          4
Trends that Affect Security


• Increase of network attacks
• Increased sophistication of attacks
• Increased dependence on the network
• Lack of trained personnel
• Lack of awareness
• Lack of security policies
• Wireless access
• Legislation
• Litigation



                                        5
Network Threats Attack Examples


• There are four general categories of security threats to the
  network:
    Unstructured threats
    Structured threats
    External threats                                              Internal
                                                                exploitation
    Internal threats          Internet          Dial-in
                            Ex                exploitation
                           ex tern
                             pl o a l
                                 it a
                                     ti o
                                          n




                                                  Compromised
                                                     host

                                                                               6
Four Classes of Network Attacks


 Reconnaissance attacks
 Access attacks
 Denial of service attacks
 Worms, viruses, and Trojan horses




                                     7
Specific Attack Types

• All of the following can be used to compromise your system:
    Packet sniffers
    IP weaknesses
    Password attacks
    DoS or DDoS
    Man-in-the-middle attacks
    Application layer attacks
    Trust exploitation
    Port redirection
    Virus
    Trojan horse
    Operator error
    Worms


                                                                8
Reconnaissance Attack Example

• Sample IP
  address
  query




              Sample
              domain
              name
              query
                                  9
Reconnaissance Attack Example

• Sample IP
  address
  query




              Sample
              domain
              name
              query
                                  9

More Related Content

What's hot

Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LANArpit Suthar
 
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffingBhavya Chawla
 
Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANsIshraq Al Fataftah
 
Password sniffing
Password sniffingPassword sniffing
Password sniffingSRIMCA
 
Network packet analysis -capture and Analysis
Network packet analysis -capture and AnalysisNetwork packet analysis -capture and Analysis
Network packet analysis -capture and AnalysisManjushree Mashal
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning Viren Rao
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSystem ID Warehouse
 
Snort
SnortSnort
Snortnazzf
 
The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls david rom
 
Packet capture in network security
Packet capture in network securityPacket capture in network security
Packet capture in network securityChippy Thomas
 

What's hot (20)

Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LAN
 
Sniffing via dsniff
Sniffing via dsniffSniffing via dsniff
Sniffing via dsniff
 
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffing
 
Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
 
Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANs
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Password sniffing
Password sniffingPassword sniffing
Password sniffing
 
Snort
SnortSnort
Snort
 
Network packet analysis -capture and Analysis
Network packet analysis -capture and AnalysisNetwork packet analysis -capture and Analysis
Network packet analysis -capture and Analysis
 
Introduction to Snort
Introduction to SnortIntroduction to Snort
Introduction to Snort
 
Wiretapping
WiretappingWiretapping
Wiretapping
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning
 
Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
 
Snort
SnortSnort
Snort
 
Snort
SnortSnort
Snort
 
The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Packet capture in network security
Packet capture in network securityPacket capture in network security
Packet capture in network security
 
Snort
SnortSnort
Snort
 

Similar to Packet Sniffers: Detecting and Mitigating Network Threats

Phases of penetration testing
Phases of penetration testingPhases of penetration testing
Phases of penetration testingAbdul Rahman
 
DoS Attack - Incident Handling
DoS Attack - Incident HandlingDoS Attack - Incident Handling
DoS Attack - Incident HandlingMarcelo Silva
 
Spying The Wire
Spying The WireSpying The Wire
Spying The WireDon Anto
 
Extracting the Malware Signal from Internet Noise
Extracting the Malware Signal from Internet NoiseExtracting the Malware Signal from Internet Noise
Extracting the Malware Signal from Internet NoiseAshwini Almad
 
Extracting the Malware Signal from Internet Noise
Extracting the Malware Signal from Internet NoiseExtracting the Malware Signal from Internet Noise
Extracting the Malware Signal from Internet NoiseEndgameInc
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing pptAnushakp9
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.pptDetSersi
 
Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attackschris zlatis
 
Lecture 12 -_internet_security
Lecture 12 -_internet_securityLecture 12 -_internet_security
Lecture 12 -_internet_securitySerious_SamSoul
 

Similar to Packet Sniffers: Detecting and Mitigating Network Threats (20)

sniffer.ppt
sniffer.pptsniffer.ppt
sniffer.ppt
 
Session Slide
Session SlideSession Slide
Session Slide
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
Phases of penetration testing
Phases of penetration testingPhases of penetration testing
Phases of penetration testing
 
DoS Attack - Incident Handling
DoS Attack - Incident HandlingDoS Attack - Incident Handling
DoS Attack - Incident Handling
 
Spying The Wire
Spying The WireSpying The Wire
Spying The Wire
 
IP spoofing .pptx
IP spoofing .pptxIP spoofing .pptx
IP spoofing .pptx
 
Extracting the Malware Signal from Internet Noise
Extracting the Malware Signal from Internet NoiseExtracting the Malware Signal from Internet Noise
Extracting the Malware Signal from Internet Noise
 
Extracting the Malware Signal from Internet Noise
Extracting the Malware Signal from Internet NoiseExtracting the Malware Signal from Internet Noise
Extracting the Malware Signal from Internet Noise
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Network forensics1
Network forensics1Network forensics1
Network forensics1
 
DDOS ATTACK - MIRAI BOTNET
DDOS ATTACK - MIRAI BOTNET DDOS ATTACK - MIRAI BOTNET
DDOS ATTACK - MIRAI BOTNET
 
Firewall Defense against Covert Channels
Firewall Defense against Covert Channels Firewall Defense against Covert Channels
Firewall Defense against Covert Channels
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
Rumor riding
Rumor ridingRumor riding
Rumor riding
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 
1.SNORT.pdf
1.SNORT.pdf1.SNORT.pdf
1.SNORT.pdf
 
Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attacks
 
Lecture 12 -_internet_security
Lecture 12 -_internet_securityLecture 12 -_internet_security
Lecture 12 -_internet_security
 

Packet Sniffers: Detecting and Mitigating Network Threats

  • 1. Packet Sniffers Prepared By: Amer Alhorini Supervised By: Dr. Lo'ai Tawalbeh NYIT New York Institute of Technology 1
  • 3. Packet Sniffers Host A Host B Router A Router B • A packet sniffer is a software application that uses a network adapter card in promiscuous mode to capture all network packets. The following are the packet sniffer features: Packet sniffers exploit information passed in clear text. Protocols that pass information in the clear include the following: •Telnet •FTP •SNMP •POP Packet sniffers must be on the same collision domain. 3
  • 4. Packet Sniffer Mitigation Host A Host B Router A Router B • The following techniques and tools can be used to mitigate sniffers: Authentication—Using strong authentication, such as one-time passwords, is a first option for defense against packet sniffers. Switched infrastructure—Deploy a switched infrastructure to counter the use of packet sniffers in your environment. Antisniffer tools—Use these tools to employ software and hardware designed to detect the use of sniffers on a network. Cryptography—The most effective method for countering packet sniffers does not prevent or detect packet sniffers, but rather renders them irrelevant. 4
  • 5. Trends that Affect Security • Increase of network attacks • Increased sophistication of attacks • Increased dependence on the network • Lack of trained personnel • Lack of awareness • Lack of security policies • Wireless access • Legislation • Litigation 5
  • 6. Network Threats Attack Examples • There are four general categories of security threats to the network: Unstructured threats Structured threats External threats Internal exploitation Internal threats Internet Dial-in Ex exploitation ex tern pl o a l it a ti o n Compromised host 6
  • 7. Four Classes of Network Attacks Reconnaissance attacks Access attacks Denial of service attacks Worms, viruses, and Trojan horses 7
  • 8. Specific Attack Types • All of the following can be used to compromise your system: Packet sniffers IP weaknesses Password attacks DoS or DDoS Man-in-the-middle attacks Application layer attacks Trust exploitation Port redirection Virus Trojan horse Operator error Worms 8
  • 9. Reconnaissance Attack Example • Sample IP address query Sample domain name query 9
  • 10. Reconnaissance Attack Example • Sample IP address query Sample domain name query 9