SlideShare a Scribd company logo
2
Most read
3
Most read
Prensentation on packet sniffer and injection tool
 Network sniffing
• What is network sniffing.
• What is network sniffer used for?
• Disadvantages of network sniffer.
• Example of network sniffer.
Injection tools
• Injection
• Types of code injection
References
Prensentation on packet sniffer and injection tool
WHAT IS NETWORK SNIFFING?
• Process of capturing, decoding, and analyzing network traffic
is called network sniffing.
• Network sniffing is a tool that can help you locate network
problems by allowing you to capture and view packet level
data on your network. The Colasoft Capsa Network sniffer is a
powerful network analyser
• A packet sniffer is a software application that uses a network
adapter card in promiscuous mode to capture all network
packets.
• Typical use of network sniffer is to analyze network traffic and
bandwidth utilization, so that underlying troubles in the network can
be identified.
• Analyze network problem.
• Detect network misuse by internal and external users.
• Gain information for effecting network intrusion.
• Spy on other network users and collect sensitive information such as log in details.
• Gather and report network statistics.
• Filter suspect content from network traffic.
• Verify internal control system effectiveness( firewall, web filter, access control).
.
WHAT IS NETWORK SNIFFING USED FOR ?
DISADVANTAGES OF NETWORK
SNIFFING
 With positive uses there are also some negative uses.
 Catching password, which is the main reason for most illegal uses of
sniffing tools.
 Capturing special and private information of transaction, like username,
passwords, account.
 Some sniffers can even modify target the computer’s information and
damage the system.
EXAMPLE OF NETWORK SNIFFERS
• TcpDump : command line packet analyzer(sniffer)
• winDump : port of tcpdump for windows.
• Wireshark : a GUI based alternative to tcpdump.
• Ettercap
• Hping
• Kismet : for wireless LANs
Prensentation on packet sniffer and injection tool
INJECTION
• Injection refers to the process of interfering with an established
network connection, by means of constructing packets to appear
as if they are part of the normal communication stream.
TYPES OF CODE INJECTION
• SQL Injection: structured query language.
• Cross-site scripting
• Dynamic evaluation vulnerabilities
• Object injection
• Remote file injectionShel
• Shell injection
• WWW.GOOGLE.COM
• WWW.PREZY.COM
REFERENCES
Prensentation on packet sniffer and injection tool

More Related Content

PPTX
Ethical Hacking - sniffing
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PPTX
PPTX
Understanding NMAP
PPTX
PPT
CYBER CRIME AND SECURITY
PPTX
Network Security Nmap N Nessus
PPTX
Network Forensics
Ethical Hacking - sniffing
Intrusion Detection Systems and Intrusion Prevention Systems
Understanding NMAP
CYBER CRIME AND SECURITY
Network Security Nmap N Nessus
Network Forensics

What's hot (20)

PDF
F5 Web Application Security
PDF
Ceh v5 module 03 scanning
PPT
Proxy servers
PDF
VPN - Virtual Private Network
PPTX
Nmap(network mapping)
PPTX
Wireshark
PDF
Threat Modeling Basics with Examples
PPT
Ch07 Access Control Fundamentals
PDF
F5 DDoS Protection
PPT
Snort
PPTX
Network monitoring system
PDF
M1-02-HowCriminalsPlan.pdf
PPT
PDF
Network Security Fundamentals
PPTX
Network forensic
PPTX
Network security
PPT
DDOS Attack
PPTX
Intrusion detection
PPTX
Introduction To Exploitation & Metasploit
F5 Web Application Security
Ceh v5 module 03 scanning
Proxy servers
VPN - Virtual Private Network
Nmap(network mapping)
Wireshark
Threat Modeling Basics with Examples
Ch07 Access Control Fundamentals
F5 DDoS Protection
Snort
Network monitoring system
M1-02-HowCriminalsPlan.pdf
Network Security Fundamentals
Network forensic
Network security
DDOS Attack
Intrusion detection
Introduction To Exploitation & Metasploit
Ad

Viewers also liked (20)

PPTX
Sniffing and spoofing
PDF
What IT Professionals Need to Know about Sniffing Wireless Traffic in 2016
PDF
Hacking tools
PPTX
DevLink - WiFu: You think your wireless is secure?
PPTX
Hacking Wireless Networks : Null Delhi (November)
PPT
Sniffing in a Switched Network
PPT
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
PPTX
Tata steel’s acquisition of corus
PPTX
Tata Corus acquisition
PPTX
Denial of service attack
PPT
Module 5 Sniffers
PPTX
Turbulent flow
PPTX
Phishing ppt
PPTX
Denial of service attack
PDF
Packet sniffing & ARP Poisoning
PPT
How To Hack Wireless Internet Connections
PPTX
Packet sniffers
PPT
DDoS Attacks
PDF
Alphorm.com Formation CEHV9 III
PDF
Sniffing via dsniff
Sniffing and spoofing
What IT Professionals Need to Know about Sniffing Wireless Traffic in 2016
Hacking tools
DevLink - WiFu: You think your wireless is secure?
Hacking Wireless Networks : Null Delhi (November)
Sniffing in a Switched Network
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Tata steel’s acquisition of corus
Tata Corus acquisition
Denial of service attack
Module 5 Sniffers
Turbulent flow
Phishing ppt
Denial of service attack
Packet sniffing & ARP Poisoning
How To Hack Wireless Internet Connections
Packet sniffers
DDoS Attacks
Alphorm.com Formation CEHV9 III
Sniffing via dsniff
Ad

Similar to Prensentation on packet sniffer and injection tool (20)

PPTX
Network traffic analysis with cyber security
PPTX
Network Analysis Mini Project 2.pptx
PDF
Network Analysis Mini Project 2.pdf
PPTX
An Toan Thong Tin.pptx
PPTX
Threat_actors_and_vectors_with_whiiteandblack_boxtesting.pptx
PPTX
Network Traffic Analysis With Wireshark.pptx
PPTX
Minimizing Information Transparency
PPT
1. Network monitoring and measurement-2.ppt
PDF
Wireshark Tool - Features & Benefits.pdf
PPTX
CompTIA Security+ Chapter Four Review
PPTX
Intrusion detection and prevention system
PPTX
Intrusion Prevention System
PPT
Ethical Hacking
PPT
Ethical hacking
PPTX
Cours_4_IDS_IPS.pptx
PPT
intrusion detection system (IDS)
PDF
Ccna sec 01
PPTX
Slides on Security issues in TCP/IP Clear explanation
PDF
Coporate Espionage
PPT
Introduction to firewalls
Network traffic analysis with cyber security
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pdf
An Toan Thong Tin.pptx
Threat_actors_and_vectors_with_whiiteandblack_boxtesting.pptx
Network Traffic Analysis With Wireshark.pptx
Minimizing Information Transparency
1. Network monitoring and measurement-2.ppt
Wireshark Tool - Features & Benefits.pdf
CompTIA Security+ Chapter Four Review
Intrusion detection and prevention system
Intrusion Prevention System
Ethical Hacking
Ethical hacking
Cours_4_IDS_IPS.pptx
intrusion detection system (IDS)
Ccna sec 01
Slides on Security issues in TCP/IP Clear explanation
Coporate Espionage
Introduction to firewalls

Recently uploaded (20)

PDF
Abrasive, erosive and cavitation wear.pdf
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
Artificial Intelligence
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPTX
Management Information system : MIS-e-Business Systems.pptx
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PPTX
introduction to high performance computing
PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PDF
Soil Improvement Techniques Note - Rabbi
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
Abrasive, erosive and cavitation wear.pdf
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
Safety Seminar civil to be ensured for safe working.
Artificial Intelligence
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Automation-in-Manufacturing-Chapter-Introduction.pdf
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Management Information system : MIS-e-Business Systems.pptx
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
III.4.1.2_The_Space_Environment.p pdffdf
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
introduction to high performance computing
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
Soil Improvement Techniques Note - Rabbi
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...

Prensentation on packet sniffer and injection tool

  • 2.  Network sniffing • What is network sniffing. • What is network sniffer used for? • Disadvantages of network sniffer. • Example of network sniffer. Injection tools • Injection • Types of code injection References
  • 4. WHAT IS NETWORK SNIFFING? • Process of capturing, decoding, and analyzing network traffic is called network sniffing. • Network sniffing is a tool that can help you locate network problems by allowing you to capture and view packet level data on your network. The Colasoft Capsa Network sniffer is a powerful network analyser • A packet sniffer is a software application that uses a network adapter card in promiscuous mode to capture all network packets.
  • 5. • Typical use of network sniffer is to analyze network traffic and bandwidth utilization, so that underlying troubles in the network can be identified. • Analyze network problem. • Detect network misuse by internal and external users. • Gain information for effecting network intrusion. • Spy on other network users and collect sensitive information such as log in details. • Gather and report network statistics. • Filter suspect content from network traffic. • Verify internal control system effectiveness( firewall, web filter, access control). . WHAT IS NETWORK SNIFFING USED FOR ?
  • 6. DISADVANTAGES OF NETWORK SNIFFING  With positive uses there are also some negative uses.  Catching password, which is the main reason for most illegal uses of sniffing tools.  Capturing special and private information of transaction, like username, passwords, account.  Some sniffers can even modify target the computer’s information and damage the system.
  • 7. EXAMPLE OF NETWORK SNIFFERS • TcpDump : command line packet analyzer(sniffer) • winDump : port of tcpdump for windows. • Wireshark : a GUI based alternative to tcpdump. • Ettercap • Hping • Kismet : for wireless LANs
  • 9. INJECTION • Injection refers to the process of interfering with an established network connection, by means of constructing packets to appear as if they are part of the normal communication stream.
  • 10. TYPES OF CODE INJECTION • SQL Injection: structured query language. • Cross-site scripting • Dynamic evaluation vulnerabilities • Object injection • Remote file injectionShel • Shell injection