You are on page 1of 1

In this video, you will

learn to: describe packet sniffing and how


it can be used to gather information
about your network, describe the
countermeasures you can deploy to safeguard
against packet sniffers. Packet sniffing which is another predominant
Internet security threat. So this is a
broadcast style where it uses broadcast UD methods. For example, such as UDP, the
network interface
called the NIC. By definition reads all packets
that are past five, when it's in the
promiscuous mode. It can read all unencrypted data. So that password is
sent in the clear. For example, like we tell them a NIC card that's been
promiscuous mode
will pick that up. We'll take a look at
this diagram here on Slide 14. We say client be communicating on point A the
payloads
rather the field headers in the IP package talks
about the source as being B the destination being
A, and the payload. While client C running
and promiscuous smelled won't be able to detect
all of that information. So how do we conduct
counter measures against this? One countermeasure
for packet sniffing is that all of the hosts
old computer clients plus the computer network services
like servers and routers and switches run software that check periodically, if that
host interfaces
in the promiscuous mode. So as you can see,
that NIC card promiscuous mode is the dangerous element to that. So basically we
also have
the setup only one host per segment of the broadcast media which is either switched
Ethernet at hub. So the diagram once
again on the bottom of Page 15 shows the threat and the opportunity for
clients C to pick up message traffic between B and A when it's in a
promiscuous as well.

You might also like