Sniffing

Sniffing Involves retrieving packets of data over a network using a specific program or device.

Sniffing Types:

Type of Scanning Description
Passive sniffing In passive sniffing, There is no packet sending is required.
Active sniffing In active sniffing, We request a packet with source and destination addresses.

Sniffing Tools:

Name of tools for sniffing Description
BetterCAP

The BetterCAP tool is a very powerful, flexible, and portable best software tool created to perform various types of MITM attacks against networks and manipulate its HTTP, HTTPS, and TCP traffic in real-time, sniffing it for as well as credentials, and much more through it.

Ettercap

Ettercap tool is a software comprehensively sharp tool suited for man-in-the-middle attacks for networks. It has features as well as sniffing of live connections, content filtering.

Wireshark

Wireshark tool is a tool that is known as one of the most popular packet sniffers. It offers an unlimited number of features designed to implement and assist in the dissection and analysis of traffic for it.

Tcpdump

 tcpdump is a tool that provides the ability to intercept and ability to observing TC P/IP and other packets during transmission over the network.

WinDump

A Windows port the popular to Linux as well as packet sniffers at tcpdump, which is a command-line tool that is perfect for displaying header information through it. Due to the success of tcpdump on Unix-like operating systems os, it was “ported over” to the windows platforms to it, This simply means it was cloned to allow for Windows packet capturing it.

Dsniff

This tool is a pair of tools designed to perform sniffing packets with differentiating protocols with the intention of intercepting and revealing passwords as well the Dsniff tool is designed for the Unix and Linux platforms and does not have a full equivalent on the Windows platforms for support.

Sniffing Attacks:

Name of Term Description of term
MAC flooding Send multiple fake MAC addresses to the switch until the CAM table is full. This puts the switch open on failure, where it propagates incoming traffic to all ports on the network.
DHCP attacks A type of denial-of-service attack that exhausts all available server addresses.
DNS poisoning Manipulate the DNS table by replacing a legitimate IP address with a malicious one.
VLAN hopping Attack a host on one VLAN to access traffic on other VLANs.
OSPF attacks Form a trust relationship with adjacent routers.

Ethical Hacking Cheatsheet

Ethical hacking includes authorized attempts to gain unauthorized access to computer systems, applications, or data. Ethical hacking requires replicating the strategies and behaviors of malicious attackers. This practice helps identify security vulnerabilities, So they can be fixed before malicious attackers can exploit them. 

Similar Reads

Basics:

Necessary Terms:...

Legal Laws and Cyber Acts:

Name of Term Description of term RFC 1918 For Private IP Standard  RFC 3227 For Data collection and storage  ISO 27002 For Information Security Guidelines CAN-SPAM For Email Marketing SPY-Act For License Enforcement  DMCA For Intellectual Property  SOX For Corporate Finance Processes GLBA For Personal Finance Data  FERPA For Education Records  FISMA For Government Networks Security Standards CVSS For Common Vulnerability Scoring System  CVE For Common Vulnerabilities and Exposure...

Reconnaissance:

Footprinting information:...

Scanning Networks:

Involves collecting additional information about the victim’s host, port, and network services. It aims to identify vulnerabilities and then plan attacks....

Enumeration:

Enumeration is a process in ethical hacking, which Interact with the system and interrogate it to obtain the necessary information. Involves the discovery and exploitation of vulnerabilities....

Sniffing:

Sniffing Involves retrieving packets of data over a network using a specific program or device....

System Hacking:

System hacking is defined as a compromise between a computer system and software to gain access to a target computer and steal or misuse their sensitive information....

Social Engineering:

Social engineering refers to pressuring people in a targeted organization to disclose sensitive or confidential information....

Web Hacking:

Web hacking generally refers to exploiting applications over the Hypertext Transfer Protocol (HTTP). This can be done by manipulating the application through a web graphical interface, by manipulating the Uniform Resource Identifier (URI), or by abusing HTTP elements....

Cryptography:

Encryption is the process of hiding sensitive information....

Cloud Security:

Cloud providers implement restricted access and access policies with logs and the ability to request access and denial reasons....