Home

Jan 29, 2018

Capturing Network Traffic


To capture network traffic, you must be on your local area network (LAN) or on a prominent intermediary point and connected to a hub, switch, or border router through which traffic crosses. Earlier, almost everyone used hubs, and by connecting to hubs, you could do what is identified as passive sniffing. Passive sniffing was possible on a hub because on hubs, all traffic was sent to all ports.

Category:Tutorials 

To capture network traffic, you must be on your local area network (LAN) or on a prominent intermediary point and connected to a hub, switch, or border router through which traffic crosses. Earlier, almost everyone used hubs, and by connecting to hubs, you could do what is identified as passive sniffing. Passive sniffing was possible on a hub because on hubs, all traffic was sent to all ports.

All someone had to do was plug into the hub, start the sniffer, and wait for someone on the same interference domain to start sending or receiving data. Remember that hubs are essentially shared bandwidth, whereas switches separate collision domains. In almost every case today, you will be connecting to either a managed or unmanaged switch.

When associating to a switch, you are going to have to do something to get all of the traffic redirected to you. This kind of interception is known as active sniffing, because a switch restricts the traffic that a sniffer can see to broadcast packets and those specifically addressed to the attached system. Traffic between other hosts would not usually be seen by the sniffer, as this traffic would not normally be transmitted to the switch port that the sniffer is plugged into. There are many ways to get this traffic forwarded to you:

Some of these methods might be built into the switch, while others are typically used only by hackers.

image: 

keywords: network, Sniffing, speed

Previous Article
Next Article
Discord

Page 1 of 480  >  >>

Microsoft offers workaround to mitigate the IE Scripting Engine Memory Corruption Vulnerability

ie_11_logo.jpg

Jan 19, 2020 | Category: Microsoft | Comments

Clément Lecigne of Google’s Threat Analysis Group reported about an IE vulnerability that allowed remote execution of code via Internet Explorer.

read more…

Steam on the way to Chromebooks, but is there any point?

chrome_os_steam_hero_more_like.png

Jan 18, 2020 | Category: General | Comments

Google works with Valve.

read more…

Emotet Malware Targeted United Nations Via Phishing Attack

Cloudmark_Takes_Aim_at_Spear_Phishing_with_‘Trident’_Security_Solution_1132x670_800x445.jpg

Jan 17, 2020 | Category: General | Comments

As reported, a phishing attack targeted United Nations with Emotet malware. The dedicated email phishing campaign targeted 600 UN email addresses.

read more…

Page 1 of 480  >  >>