[http://s1.shard.jp/losaul/atlas-of-australian.html australia canberra university ] [http://s1.shard.jp/olharder/auto-title-services.html automobile chrysler dealer ] [http://s1.shard.jp/galeach/new151.html asian clip hunte ] [http://s1.shard.jp/galeach/new164.html gay asian men videos ] [http://s1.shard.jp/losaul/weight-loss-medication.html airfare australian domestic ] [http://s1.shard.jp/bireba/symantec-antivirus.html avg antivirus full ] australia physiotherapy [http://s1.shard.jp/olharder/discount-auto-part.html auto digitizing embroidery software ] [http://s1.shard.jp/losaul/nlp-training.html cobra replicas australia ] [http://s1.shard.jp/galeach/new4.html reports on the tsunami in asia ] [http://s1.shard.jp/frhorton/wntjtqor2.html escourtsouthafrica ] [http://s1.shard.jp/frhorton/ybfhg5c59.html albino african frog ] [http://s1.shard.jp/bireba/computer-antivirus.html norton antivirus 2005 cracked ] [http://s1.shard.jp/bireba/norton-antivirus.html panda titanium antivirus 2005 keygen ] [http://s1.shard.jp/losaul/wwe-wrestlemania.html australian artists female ] [http://s1.shard.jp/frhorton/hs3lzrck3.html is desertification in africa affecting people ] [http://s1.shard.jp/bireba/antivirus-2004.html top antivirus software reviews ] bronx shoes south africa [http://s1.shard.jp/frhorton/9viywdetn.html major deserts in africa ] [http://s1.shard.jp/bireba/download-symantec.html nod32 antivirus reviews ] [http://s1.shard.jp/olharder/ontario-auto-insurance.html auto penny pinchers ] [http://s1.shard.jp/galeach/new186.html asian groceries ] [http://s1.shard.jp/olharder/automatic-gate.html auto dialer programs ] [http://s1.shard.jp/bireba/symantec-norton.html top antivirus for 2005 ] [http://s1.shard.jp/galeach/new25.html asia air fare ] asian movie samples [http://s1.shard.jp/olharder/auto-part-for.html memory lane auto part ] [http://s1.shard.jp/losaul/police-federation.html golden retriever breeders australia ] [http://s1.shard.jp/galeach/new30.html asia job management services ] [http://s1.shard.jp/bireba/grisoft-antivirus.html linux antivirus reviews ] [http://s1.shard.jp/losaul/sai-global-australia.html australia economy ] [http://s1.shard.jp/frhorton/1aei449pv.html africa business forum ] [http://s1.shard.jp/bireba/antivirus-windows.html lu1803 norton antivirus ] [http://s1.shard.jp/olharder/autonomy-principal.html holzvergaser auto ] [http://s1.shard.jp/olharder/auto-hydrogene.html uk auto salvage auctions ] [http://s1.shard.jp/galeach/new137.html high grade prostatic intraepithelial neoplasia ] [http://s1.shard.jp/losaul/australia-desert.html aprenticeships australia ] [http://s1.shard.jp/frhorton/6znbfza3k.html africaexperts.com ] [http://s1.shard.jp/losaul/dog-bike-trailer.html academic dress australia ] [http://s1.shard.jp/galeach/new74.html asian desert maps ] [http://s1.shard.jp/galeach/new152.html asian film actress ] [http://s1.shard.jp/bireba/maafee-antivirus.html kaspersky antivirus personal pro 5.0 crack ] [http://s1.shard.jp/bireba/antivirus-checking.html symantec antivirus corporate edition v 10 ] [http://s1.shard.jp/frhorton/9rxlvcl6n.html photo of african american woman ] [http://s1.shard.jp/frhorton/z7u5veip8.html experience africa ] site [http://s1.shard.jp/losaul/quiksilver-pro.html enzed australia ] [http://s1.shard.jp/bireba/review-zone-alarm.html norton antivirus keygen download ] [http://s1.shard.jp/losaul/australia-from.html creature comforts dvd australia ] [http://s1.shard.jp/frhorton/h9wk8xs2j.html information on the country of africa ]
Last revision (mm/dd/yy): 05/27/2009
Network Eavesdropping or network sniffing is a network layer attack consisting of capturing packets from the network transmitted by others' computers and reading the data content in search of sensitive information like passwords, session tokens, or any kind of confidential information.
The attack could be done using tools called network sniffers. These tools collect packets on the network and, depending on the quality of the tool, analyze the collected data like protocol decoders or stream reassembling.
Depending on the network context, for the sniffing to be the effective, some conditions must be met:
â¢ LAN environment with HUBs
This is the ideal case because the hub is a network repeater that duplicates every network frame received to all ports, so the attack is very simple to implement because no other condition must be met.
â¢ LAN environment with switches
To be effective for eavesdropping, a preliminary condition must be met. Because a switch by default only transmits a frame to the port, a mechanism that will duplicate or will redirect the network packets to an evil system is necessary. For example, to duplicate traffic from one port to another port, a special configuration on the switch is necessary. To redirect the traffic from one port to another, there must be a preliminary exploitation like the arp spoof attack. In this attack, the evil system acts like a router between the victimâs communication, making it possible to sniff the exchanged packets.
â¢ WAN environment
In this case, to make a network sniff it's necessary that the evil system becomes a router between the client server communications. One way to implement this exploit is with a DNS spoof attack to the client system.
Network Eavesdropping is a passive attack which is very difficult to discover. It could be identified by the effect of the preliminary condition or, in some cases, by inducing the evil system to respond a fake request directed to the evil system IP but with the MAC address of a different system.
When a network device called a HUB is used on the Local Area Network topology, the Network Eavesdropping become easier because the device repeats all traffic received on one port to all other ports. Using a protocol analyzer, the attacker can capture all traffic on the LAN discovering sensitive information.
Figure 1. Local Eavesdropping attack.
Related Threat Agents