Home

Jan 29, 2018

Capturing Network Traffic


To capture network traffic, you must be on your local area network (LAN) or on a prominent intermediary point and connected to a hub, switch, or border router through which traffic crosses. Earlier, almost everyone used hubs, and by connecting to hubs, you could do what is identified as passive sniffing. Passive sniffing was possible on a hub because on hubs, all traffic was sent to all ports.

Category:Tutorials 

To capture network traffic, you must be on your local area network (LAN) or on a prominent intermediary point and connected to a hub, switch, or border router through which traffic crosses. Earlier, almost everyone used hubs, and by connecting to hubs, you could do what is identified as passive sniffing. Passive sniffing was possible on a hub because on hubs, all traffic was sent to all ports.

All someone had to do was plug into the hub, start the sniffer, and wait for someone on the same interference domain to start sending or receiving data. Remember that hubs are essentially shared bandwidth, whereas switches separate collision domains. In almost every case today, you will be connecting to either a managed or unmanaged switch.

When associating to a switch, you are going to have to do something to get all of the traffic redirected to you. This kind of interception is known as active sniffing, because a switch restricts the traffic that a sniffer can see to broadcast packets and those specifically addressed to the attached system. Traffic between other hosts would not usually be seen by the sniffer, as this traffic would not normally be transmitted to the switch port that the sniffer is plugged into. There are many ways to get this traffic forwarded to you:

Some of these methods might be built into the switch, while others are typically used only by hackers.

image: 

keywords: network, Sniffing, speed

Previous Article
Next Article
Discord

Page 1 of 433  >  >>

See what Facebook is planning to do

ruhul-vi-banner-1024x573.jpg

Sep 5, 2019 | Category: General | Comments

Follows in Instagram's footsteps.

read more…

Avast and French police stopped crypto worm that had infected 850,000 machines

Skjermbilde-2019-09-02-kl.-15.04.51.jpg

Sep 4, 2019 | Category: General | Comments

The attackers had made a mistake ...

read more…

Apple is finally admitting this problem

watch-view-2.png

Sep 3, 2019 | Category: Apple | Comments

Now you can switch the Apple Watch screen for free.

read more…

Page 1 of 433  >  >>