Professional Documents
Culture Documents
Junaid Khan Eavesdropping Attack
Junaid Khan Eavesdropping Attack
Eavesdropping Attack
An eavesdropping attack occurs when a hacker intercepts, deletes, or modifies data that
is transmitted between two devices. Eavesdropping, also known as sniffing or snooping,
relies on unsecured network communications to access data in transit between devices.
Eavesdropping Methods
With eavesdropping, attackers can use various methods to launch attacks that typically
involve the use of various eavesdropping devices to listen in on conversations and
network activity.
Despite all the technological advances making digital eavesdropping increasingly easy,
many attacks still rely on intercepting telephones. That is because telephones have
electric power, built-in microphones, speakers, space for hiding bugs, and are easy to
quickly install a bug on. Eavesdropping attackers can monitor conversations in the room
the telephone is in and calls to telephones anywhere else in the world.