Sniffer Safety Technology

xiaoxiao2021-03-06  37

Sniffer Safety Technology

Sniffer is a commonly used collection of useful data methods, which can be the user's account and password, which can be some commercial confidential data, etc. Sniffff can be used as a device capable of capturing a web packet, and ISS is defined as SNIFFER: Sniffer is a tool for intercepting data packets for other computers using a computer's network interface.

Sniffer principle

The SNIFFER program is a tool that uses the Ethernet feature to set the network adapter card (NIC, generally the Too That Thailay card). Once the card is set to this mode, it can receive transmission Each packet on the network.

■ Sniffer principle ■ Sniffer - Introduction ■ Sniffer meaning and working principle ■ Basic principle of sniffing ■ Network listening technology

Sniffer tools and tutorials

Sniffit is a network listening software that is running in various platforms such as Linux, Solaris, SGI, NT, which is developed by Lawrence Berkeley Laboratory. It is mainly for the unsafeness of the TCP / IP protocol to monitor the machine running the protocol. Like all SNIFFERs, the packet must be running the Sniffit machine to be listened, so Sniffit can only monitor the machine on the same network segment.

■ Free Snifer - Sniffit ■ Sentinel A small Anti-Sniffer Tool ■ In-depth learning Sniffer under Linux ■ Hacker common sniffer analysis ■ CIW Experiment Tutorial: Capture encryption packages and non-encrypted packages using Sniffer ■ A sniffer PPT Tutorial ■ Sniffer Pro English Teaching Videos

Sniffer Attack Example

Let's take a look at an actual example of using SNIFFER for passive attacks. Suppose we have successfully attacked the Solaris host 202.11.22.33 through some way and get the highest root permission on this host. Then, now we can use Sniffer on this host to sniff the password transmitted on this network segment.

■ Sniffer Attack Example ■ Sniffer Technical Information ■ Sniffer Hacker Tutorial ■ Sniffer Network Management Solutions in Wenya Industry ■ Implementation of ARP Snifer in Windows Exchange Environment

Defense SNIFFER attack and related applications

Although a SNIFFER is found to be very difficult, we still have a way to resist sniffer sniffing attacks. Since SNIFFER wants to capture our confidential information, then we simply let it capture, but in advance to encrypt this information, even if the hacker captures our confidential information, it cannot decrypt, so that Sniffer lost its role.

■ How to defend a Sniffer attack ■ How to find a sniffer on a network ■ Principles from the network sniffing ■ Principle, implementation and prevention ■ Full introduction Sniffer ■ Sniffer, hacker and network management ■ Exchange network environment sniffing protector under Linux Implementation

转载请注明原文地址:https://www.9cbs.com/read-64302.html

New Post(0)