Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
9Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
CEHv6 Module 10 Sniffers

CEHv6 Module 10 Sniffers

Ratings: (0)|Views: 16,948|Likes:
Published by humosapiens

More info:

Published by: humosapiens on Nov 21, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

12/23/2012

pdf

text

original

 
Ethical Hacking and
Version 6
 
Sniffers
Scenario
Jamal, is anelectrician who fixeselectrical andnetworkcables. Hewascalled in foraregularinspection at the premises of XInsurance Inc.Jamalwas surprised at his findings during aroutinecheckof the AC ducts in the enterprise.The LAN wireswere laid through the ducts.ewas tempte to n te normaton owngthrough the LANwires.
What can Jamal do to sabotae the network? 
 
Whatinformation can heobtain and howsensitive is the information that he would 
EC-Council
Copyright © by
EC-Council
All Rights Reserved.ReproductionisStrictlyProhibited
obtain?
 
Module Objective
This module will familiarize you with:
SniffingProtocols vulnerable to sniffingTypes of sniffingARP and ARP spoofing attacTools for ARP spoofingMAC floodingTools for MAC floodingSniffing toolsTypes of DNS poisoningRaw sniffing toolsDetecting sniffing
EC-Council
Copyright © by
EC-Council
All Rights Reserved.ReproductionisStrictlyProhibited
Countermeasures
Module Flow
Sniffing DefinitionTools for MAC FloodingProtocols Vulnerableto SniffingSniffer Hacking ToolsTypes of SniffingTypes of DNSPoisoningRaw Sniffing ToolsARP andARP Spoofing Attack Detecting SniffingTools for ARP Spoofing
EC-Council
Copyright © by
EC-Council
All Rights Reserved.ReproductionisStrictlyProhibited
CountermeasuresMAC Flooding
 
Definition: Sniffing
 Sniffer is a roram or device that caturesthe vital information from the network trafficspecific to a particular network The objective of sniffing is tosteal:
Passwords (from email, the web, SMB, ftp,SQL, or telnet)Email textFiles in transfer email files ft files or
EC-Council
Copyright © by
EC-Council
All Rights Reserved.ReproductionisStrictlyProhibited
 
 
SMB)
Protocols Vulnerable to Sniffing
Protocols that are susceptible to
Telnetand Rlogin: Keystrokes including user names 
sniffersinclude:
 HTTP: Data sent in the clear textSMTP: Passwords and data sent in clear textNNTP: Passwords and data sent in clear textPOP: Passwords and data sent in clear textFTP: Passwords and data sent in clear textIMAP: Passwords and data sent in clear text
EC-Council
Copyright © by
EC-Council
All Rights Reserved.ReproductionisStrictlyProhibited

Activity (9)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Rodrigo Lima liked this
Jayanta Mandi liked this
o2736664 liked this
Azhar Alang liked this
cool8136 liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->